  
                   
                  2004: Good and Bad for 
                  Security 
                    
                  From a sharp increase in phishing 
                  scams to high-profile arrests, here's what made news this 
                  year. 
                  
                   Paul Roberts, IDG News Service 
                  Monday, December 27, 2004 
                  Experts agree: 2004 was the best of times 
                  and the worst of times for those concerned about security. It 
                  was a year with high-profile arrests of virus authors, and the 
                  explosion of online crimes, from cyber-extortion to identity 
                  theft, a year in which ISPs won millions in damages from 
                  spammers, and spam messages increased by 40 percent. 
                  
                  In hindsight, 2004 may be looked back 
                  upon as the year that a long tradition of hobbyist hackers and 
                  flashy, but harmless, viruses gave way to shadowy, 
                  professional online crime syndicates. The professionals were 
                  armed with virulent new threats designed to separate Internet 
                  users from their cash, according to interviews with leading 
                  security experts. 
                  With that in mind, here's a look at some 
                  of the most important technology security stories and trends 
                  of the last year: 
                  
                  Phishing: For Phun and Profit 
                  Online identity theft through phishing 
                  scams was the run-away security story of 2004, due to the 
                  explosive growth in such attacks. 
                  Phishing scams are online crimes that use 
                  spam to direct Internet users to Web sites controlled by 
                  thieves, but designed to look like legitimate e-commerce 
                  sites. Users are asked to provide sensitive information, often 
                  under the guise of updating account information, which is then 
                  captured by the thieves. 
                  E-mail security vendor MessageLabs 
                  blocked an insignificant trickle of 279 such scams in 
                  September 2003. By September 2004, that trickle swelled to a 
                  flood of more than 2 million messages, according to a 
                  statement from the company. In all, MessageLabs says it 
                  blocked 18 million phishing e-mail messages in 2004. 
                  The Anti-Phishing Working Group watched 
                  the number of reported phishing 
                  Web sites increase by an average of 28 percent each month 
                  between July and November. The average phishing Web site 
                  operated for six days before being shut down, according to 
                  Peter Cassidy, secretary general of the group. 
                  "Phishing has really exploded, it's been 
                  one of the biggest problems we've had," says Mikko Hyppönen of 
                  Finnish antivirus company F-Secure. 
                  
                  Achilles, Get Your Gun 
                  Not since the days of Ancient Greece have 
                  Trojans been as much a part of popular conversation as they 
                  were in 2004, when an explosion in Trojan 
                  horse programs turned countless Internet-connected 
                  computers into tools for malicious hackers and international 
                  online crime organizations. 
                  Carried on the back of e-mail and 
                  Internet worms, an eye-popping parade of back door Trojans 
                  marched onto vulnerable computers since January. 
                  One typical example is the ubiquitous 
                  RBot, a Trojan program that spreads using a number of methods. 
                  The program can collect system information, download and 
                  execute files, launch a denial-of-service (DOS) attack, and 
                  even remotely control a connected Web cam. 
                  RBot-A, the first version of the 
                  worm-like Trojan, was identified in March 2004. The latest, 
                  RBot RN was identified on December 13, according to U.K. 
                  antivirus company Sophos. In just nine months, there were 480 
                  different versions of the Trojan. 
                  Trojan horse and backdoor programs are 
                  not new, but the rapid growth in their use in 2004 was a 
                  product of cooperation between virus writers, online criminals 
                  and spammers, says Jesse Villa, technical product manager at 
                  Frontbridge Technologies. 
                  Trojans have been silent actors in a 
                  number of high-profile crimes, including the theft in 2003 of 
                  source 
                  code for the "Half-Life 2" video game. A Trojan horse 
                  program named Banker-AJ infected computers and waited until 
                  users visited online banking sites, at which point the program 
                  logged user keystrokes and captured account information, says 
                  Gregg Mastoras, senior security analyst at Sophos. 
                  More Trojans have also led to an increase 
                  in the number of "botnets," distributed networks of 
                  compromised machines that act as "zombies" in spam campaigns 
                  or DDOS (distributed DOS) attacks. 
                  "At the end of last year we knew of about 
                  2000 botnets. Towards the end of this year, we're looking at 
                  about 300,000," Villa says. 
                  Those networks range from 100 infected 
                  PCs to networks of thousands of zombie computers, which are 
                  rented out to aspiring spammers or for targeted DOS attacks 
                  used in online extortion rackets, Villa says. 
                  "Bots have largely gone ignored," says 
                  Hyppönen. "You don't see alerts on bots, however they have 
                  probably been a bigger problem [than viruses]." 
                  
                  Police and Patches 
                  But the news wasn't all bad. While online 
                  crimes skyrocketed in 2004, there were also a number of 
                  high-profile arrests of those involved in cybercrimes. 
                  In May, German authorities arrested 
                  18-year-old Sven Jaschan, who admitted to creating and 
                  releasing the Netsky and Sasser Internet worms, and a 
                  21-year-old German man who admitted to creating the Agobot and 
                  Phatbot Trojans. 
                  There were other victories as well, 
                  including the June arrest of those believed to be behind the 
                  2003 "Half-Life 2" source code theft and a September 
                  arrest of a man believed to be connected to the theft of 
                  source code belonging to Cisco Systems. In October, the U.S. 
                  Department of Justice arrested 19 people in connection to an 
                  online "carding" ring that traded information about stolen 
                  identity and credit card information online. 
                  In 2005, some combination of tougher law 
                  enforcement and tighter security is the best way to stem the 
                  tide of malicious and criminal behavior online, experts 
                  agree. 
                  To stop identity theft, banks, e-commerce 
                  companies and consumers need to look hard at strong user 
                  authentication technology, says Sophos' Mastoras. 
                  "In the [European Union], banks are 
                  already moving away from static passwords. I think that will 
                  be a trend that will happen in the U.S. as well," he says. 
                  E-mail sender authentication technologies 
                  such as Domain Keys from Yahoo and Sender ID from Microsoft 
                  need to be broadly adopted--a move that would make life 
                  tougher for those behind phishing scams, which often use 
                  forged e-mail sender addresses to trick unsuspecting e-mail 
                  recipients, says Mastoras. 
                  ISPs also have to begin sharing what they 
                  know about Internet attacks and compromised computers on their 
                  networks, Villa says. 
                  "This is a long term problem and we have 
                  to work together to combat it," he says. 
    
                  
 
  
                  
  
                  
                  
                  
                    Printer 
                  Friendly Version
  
  |