Hackers ahead of the game despite McColo shutdown
One step forward, two steps back
The recent takedown of a notorious botnet-friendly web-host was a major victory for the good guys but the cybercrime outlook remains grim, according to a flurry of annual reports from security vendors published on Tuesday. The reports collectively show that the internet remains a cesspool of malware and that crooks continue to have no trouble in duping ordinary surfers into getting infected.
The prevalence of booby-trapped websites is growing at an alarming rate. One new infected webpage was discovered by anti-virus firm Sophos every 4.5 seconds, three times the rate it recorded last year.
Malware contained in email attachments steadily went out of fashion over the last couple of years or so but made a return this summer. Since August, Sophos has noted a strong resurgence in the tactic, albeit in a slightly different guise. Instead of buried executables, booby-trapped Word and PDF documents are becoming more commonplace. (Security vendor Finjan agrees that PDF and Flash is becoming a vehicle of malware distribution in its latest quarterly report - registration required).
Sophos is logging five times more malicious email attachments at the end of 2008 than it did at the beginning of the year.
China and Russia often get blamed as global centres of cybercrime, but insecure US servers and PCs are a far greater problem. The US hosts 37 per cent of malware-infected websites, with China a little way behind in second place (27.7 per cent) and Russia back in the third spot (9.1 per cent).
"The US needs to clean up its act", Graham Cluley, senior security consultant at Sophos told El Reg.
A survey by Trend Micro revealed that only five per cent of malware infections resulted from the exploit of a software vulnerability. An analysis of the top 100 items of malware revealed that 53 per cent worked by duping users into downloading a malicious file, while 12 per cent operated through infected email attachments, ComputerWorld reports.
Rival security firm McAfee reckons cybercrime is prospering partly as a result of the economic chaos created by the credit crunch. It reckons more people signing up to add malicious code to websites and that phishing fraudsters are having an easier job recruiting money mules, for example. McAfee reached these conclusions after interviewing academics, criminal lawyers, law enforcement authorities and security experts globally for its annual Virtual Criminology report, published on Tuesday.
Greg Day, a security analyst at McAfee, said that not enough ministerial attention was devoted to cybercrime, which has slipped down the pecking order as a result of the credit crunch.
Looking at the UK specifically, Day said that Home Office approval of the creation of a Police Central E-Crime Unit next year was a good first step, but he criticised the level of funding, at £7m, and the Brown administration's lack of urgency in addressing cybercrime concerns highlighted by House of Lords hearings earlier this year.
Day added that greater international cooperation in fighting cybercrime was needed. He criticised the UK, like 22 other countries, for failing to ratify the Council of Europe convention on cybercrime. ®
The main problem is their is no political will to address e-crime or other online incidents. Remember this government has you reporting your credit card fraud to credit card companies, bank fraud to you bank and Ebay fraud to ebay.
There are enforcement agencies that will not take reports from victims either because they do not acknowledge it is their remit or they don't have the training and resources. We find other agencies that simple provide wrong information to victims because they are not up to date on current legislation.
Unfortunately, I do not believe this government is willing to discuss online issues seriously so I have no confidence that some of these basic issues will be addressed - let alone the more difficult ones.
@ac - "...a block list of IPs"
A block list of IPs just doesn't work.
I had trouble a while back when a number of websites I deal with all disappeared from Virgin. After some discussion with Virgin's techs, it was determined that these sites were on their blocklist (a copy of which was sent to me for analysis). Because these sites were hosted by a server that handles many websites (the most common way small websites are hosted), they were on the same IP as a single dodgy site. Further discussion revealed that normally such all catching blocks aren't employed because, as in this case, it may remove a single dodgy site but in the process takes out thousands of legitimate websites.
Took Virgin 4 days to remove that block, along with the others wrongly applied by their PFY.
They weren't sure about unblocking at first, but the idea of a court case caused by thousands of sites losing business from a potential 50% of the UK's internet users may have been a contributing factor to removing the blocks.
Paris, because she doesn't want things blocked willy nilly either!
Anyone have a breakdown of the operating systems that are involved in botnets, etc? As in, how many of each type, OS versions, and so on? I've looked, but I find a complete dearth of "by O/S" breakdown of botnet systems.