The time when viruses and worms were a top priority of IT are behind us. Phishing attacks and botnets now predominate new versions and the webscape are emerging.
This mindset, moved by cash and working in the background, is not atypical of the newest generation of Internet offenders. The spyware they surreptitiously put on an unsuspecting user’s computer makes a tiny footprint (hardly detectable) and work as a “Slave” into a remote “Master”.
Business research shows that nearly 200,000 computers become zombies REGULAR and that amount is steadily increasing (Source: CipherTrust).
A disturbing new trend developed via this generation of Internet offenders is always to lease their networks to those that would like to start low-cost mass email campaigns (also called Junk) or to extortionists to launch DDoS attacks on legitimate sites. Because of this, ddos protected vps are becoming very popular. A far more insidious danger is posed by botnets. Based on Chief Technologist at Trend Micro, Dave Rand, their combined computing power may be utilized to decrypt Internet traffic. If this were to occur (and happily there isn’t any indication of it yet), it might bring e commerce into a grinding halt.
Business experts say that phishing attacks will grow in sophistication and frequency over time. As leveled at security firm Trend Micro this tendency is developing at a quick speed.
The Trojan then tracked the user’s Internet activity (Web pages and online banking access), and sent these details to the Trojan’s creator. “It’s smarter, because they (the Internet offenders) do not have to set up a bogus server,”, said David.
Based on Mikko Hypponen, Chief Research Officer at F-Secure. “The bad boys are becoming more professional and doing more targeted strikes.”
Prepare to view assaults targeting RSS News Feeds and cell phones and phishing attacks, along with more advanced Botnets though Windows PCs remain the main target for strikes.
These strikes are significant issues that cannot be readily solved, as the goal PCs are mostly corporate networks as well as home computers. Based on Hypponen “It requires lots of end user support to spell out to your grandma the best way to configure the computer. So most ISPs will not be doing anything about it”.
For environments that are networked, there are many options which can be executed at the margin to mitigate the security threat of your network. In the event you think your personal computer or organization’s network could be at risk, please consult with a PC specialist or corporate information security consulting firm for instant help.