Feeds

Hacking activity plummets

Official figures help dispel cyberterror fears

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Security breaches and hacking attacks have diminished in numbers since the September 11 terrorist attacks, according to data from a US government monitoring agency.

Monthly reports by the Federal Computer Incident Response Center (FedCIRC), a central security coordination and analysis facility run by the US government, show just 15 incidents of intruder activity reported to it last month - less than a third of that recorded in December 2000.

This compares to a peak during 2001 of 297 incidents (which include root compromises of systems, Web face defacement attacks [presumably counting only high profile targets], probes and malicious code outbreaks) in May. In August there were 114 such incidents but this had dropped to 63 by September, which was especially surprising because of the anticipated upswing in hacking activity following the September 11 attacks.

As FedCIRC says, these statistics should be treated with caution and used only to get a general impression of the variety of intruder activity.

However security experts with Harris Corporation, which provides security software systems for both federal government and private sector customers, say hacking activity is the slowest they've seen in years.

Bill Wall, chief security engineer at Harris, said this lull was especially pronounced in December, a time when college students are on holiday and hacking activity picks up.

Among the reasons for the change are improved enterprise security practices and behaviour-based intrusion detection tools to block attacks, Wall believes. He said around three in four NT servers he comes across now are "hardened" against attack against less than 50 per cent a year ago. Harris believes this modest improvement might lead crackers into targeting computers of home users rather than businesses.

The introduction of laws that equate hacking with terrorism might also be having an effect, said Wall, who believes hacking activity will remain low unless something like the spate Chinese/US hacking attacks from early last year kicks off.

"You're not seeing that kind of cyberwar with Al-Queda," said Wall.

Records from the U.S. Space Command Computer Network Operations Center, which conducts computer network defence on behalf of the Defense Department, show an immediate lull in cracker activity following the World Trade Centre atrocity, though not for the rest of the year.

Major Barry Venable, a spokesman for the U.S. Space Command, which is responsible for three million computers spread over 10,000 networks, said that intrusion activity attempts actually decreased in the two to three weeks after September 11.

"We were watching networks very closely after September 11 because it was considered a ripe environment for people to be motivated towards hacking, however that didn't happen. I think hackers didn't want to be linked with terrorism," he told us.

U.S. Space Command data is only available up to October and that shows that attacks against Department of Defence systems, always a favourite target for crackers, have "continued unabated" throughout the year. Intrusion attempts against DoD systems totalled 40,000 for the first 10 months of 2001 against 26,000 for the whole of 2000 but the "primary reason" for this increase is improvements in detection technology, we were told. ®

Related stories

Taleban can't hack - UK govt
FBI condemns vigilante hacking
Hackers are terrorists, says UK law
Bush admin to make hacking a terrorist offence
MS makes its pitch on security, cyber terror to House
US Congress whips up 'cyber menace' again
Cyber Virus Mutant Terrorists get Hip to the Trip
Bill Clinton associates Love Bug with terrorism

Mobile application security vulnerability report

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.