Feeds

Study: Vast number of cyber attacks 'Made in the USA'

China a distant second

SANS - Survey on application security programs

When it comes to cybercrime, Eastern Europe, China, and Brazil may get the lion's share of press attention, but a new study shows a vast proportion of attacks come from computers in the United States.

Security firm SecureWorks has counted 20.6 million attacks against its customers that originated inside US borders so far this year. China ranked No. 2 on the list with 7.7 million, and Brazil and South Korea came in third and fourth, with 166,987 and 162,298 respectively. The study, which was released Monday, is a strong indication that there's no shortage of compromised computers on US soil.

The findings have important implications for organizations trying to fend off denial-of-service attacks and other net-based assaults. Namely, that they need to be aware of the threat that US-based machines pose. In August, after Russia invaded the Republic of Georgia, many Georgian IT staff members sought to secure their networks by blocking Russian IP addresses. They ended up getting clobbered anyway because they failed to block hostile computers from Turkey and the US, said Don Jackson, SecureWorks's director of threat intelligence.

Whereas many of the compromised machines in the US are under the control of people outside of the country, that is not generally the case in China. Entire university networks in that country remain under the control of hackers there, often with the help of insiders. Miscreants in Japan and Poland use much the same approach.

In related news, Chinese hacktivists have begun defacing the websites of several companies involved in the distribution of tainted milk. According to this post on the Dark Visitor blog, targets include the Sanlu Milk Company and the Mongolian Milk Corporation.

"When an infant with kidney stones lies weeping in a hospital bed, can the factory owners intuitively sense the condemnation?" one defacement reads. "In order to gain profit you have gone so far as to devastate these young lives!"

The defacements are designed to protest the shipping of baby formula containing melamine, a toxic chemical used illegally to make the milk appear it has more protein - and hoodwink food testing agencies. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.