Feeds

All my personal details for chocolate? Go on then

On social engineering, rootkits and Easter eggs

Security for virtualized datacentres

Infosec blog When I explain what I do to Spanish friends and neighbours in my faltering Castilian, people often ask me about malicious hackers. It's very often hard to explain that the viruses they receive in their email are most likely random attacks. A PC is, after all, very personal so it's easy to symphatise with people who take cyber-attacks personally themselves.

But although people reckon hackers are prepared to go to elaborate means to obtain information from their systems (a real risk but one that's sometimes overstated), many are relaxed about handing over sensitive data when approached by someone carrying a clip-board. A survey ahead of next week's Infosecurity Europe show found that 81 per cent of people quizzed at London's Victoria station were willing to part with all the personal information needed to steal their identity for the chance to win an Easter egg bonanza, worth £60.

Seemingly innocuous questions such as about a person's Easter egg consumption and pet collection were inserted into the conversation alongside other queries designed to elicit sensitive information such as a person's date of birth, address and mother's maiden name. The survey, akin to similar studies over recent years, was designed to raise awareness about how easy it is for fraudsters to use social engineering to carry out identity theft. Last year, 92 per cent of people gave over their personal details in a similar survey that offered the lure of theatre tickets as a prize. So perhaps there's been some progress, though forgive me for not being especially impressed.

Security is a consumer issue. True

Security, make no mistake about it, has become a consumer issue. But it's sometimes hard to identify the real risks from the hype that surrounds the industry.

One all too real risk is easy to identify, the possibility that cybercriminals might get their hands on a consumer's credit card details. The credit card details of an estimated 400 Britons are traded online every day, The Times reports. Details complete with security code numbers trade for $5 a pop in underground chat rooms. Valid PIN codes corresponding to these numbers can increase the asking price to $175 (£100) a throw.

Hackers might have employed a variety of techniques to obtain this data. Breaking into a corporate server where credit card information was held (the favoured theory at The Times), going through receipts carelessly discarded at gas stations or social engineering techniques are three possibilities. Infecting a user's PC with keystroke logging software is another strong possibility.

Stealth

A few years ago, systems infected by malicious code would display obvious signs of infection, such as slowing to a crawl or thrashed document files. These days hackers are getting more sneaky. A survey by security firm McAfee published on Monday reports that the use by hackers of stealth technology to disguise the presence of malware on infected systems is up 600 per cent over the last three years.

It reckons this seven-fold increase is largely down to the success of online collaborative research efforts by hackers using Web sites that contain hundreds of lines of rootkit code. "The 'open-source' environment, along with online collaboration sites and blogs are largely to blame for the increased proliferation and complexity of rootkits," McAfee concludes.

Over recent months, security firms such as F-Secure and Sunbelt Software have used blogs to exchange ideas with the wider public about their security research efforts. According to McAfee, hackers are doing much the same.

What's sauce for the goose is sauce for the gander, it would seem. ®

Beginner's guide to SSL certificates

More from The Register

next story
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.