Threats we ordinary Web users face online leave us no choice but learn. Haven't you noticed how many new things you learned lately? We are much better informed about malicious programs than just a year ago.
This section of our vocabularies grows rapidly: now we all know what a "keylogger" is,"worm" for us has something to do not only with zoology, nor a "Trojan Horse" with Ancient Greek literature. We are getting better at avoiding such scams as phishing, and this word doesn't look like a spelling mistake anymore.
We Web users are getting smarter -- at least the numbers from the recent survey by the Pew Internet and American Life Project say so. The study shows that 91% of respondents (adult Web users from the USA) have improved their online behavior in one way or another.
81% of respondents have become more cautious about e-mail attachments.
People are also avoiding certain Web sites (48%), using file-sharing networks less often (25%), and even switching browsers (18%).
But, alas? As Web users get wiser, cybercriminals become more insidious and commit more sophisticated crimes.
More people are now aware of a worm, virus or Trojan which might be hidden in a spam email attachment -- for cybercriminals it means that spam becomes less "effective" means of spreading malware.
Why they are spreading malware? What motivates them? Money, of course.
All security experts are at one in thinking that " cybercriminals are primarily motivated by financial gain". In other words, they prefer cash to fun. Instead of doing mischief just for the h? of it, they steal money. Big money.
Along with other unlawful activities, cybercriminals are actively hunting for valuable data that can be turned into cash. Stealing information needs contaminating as many PCs as possible with malicious programs. Most PC users now are aware of (or we even can say, almost got used to) the fact that Trojan horses can be included into e-mail messages, multimedia files or free knick-knackery like postcards, smileys and screensavers. We users know that many viruses, worms, and Trojan horses contain information-stealing (keylogging) modules.
Spreading malware as wide as possible that's what cyberthieves do in order to reach their treacherous goal. At least it was their main approach -- until recently, when crooks began to more intensively exploit a new tactic.
Targeting at Individual Addressees
On July 8, 2005 CERT (the US Computer Emergency Readiness Team), issued an alert warning about the rise of Trojan attacks of a new kind. Signs of these stealthy Trojan attacks, which were targeting specific firms to evade detection, have been detected for the last year. Targeted Trojan-horse attacks are a new trend in online threats, states the alert.
Trojan attacks by themselves aren't new, but CERT said this technique has two features that make it very dangerous, especially for businesses.
First, conventional anti-virus software and firewalls can't beat Trojans of this kind. These programs are "tailor-made". Source code of known Trojans, if altered, is unfamiliar to anti-viruses, and they can't detect it.
Any new variation of known malicious program is a new program for anti-viruses. There is a long way from detection of a piece of malware to the moment when an anti-virus or anti-spyware vendor is able to offer protection against it. This cycle takes time -- from several hours to a couple of days. When such a program is detected, its signature (piece of code) should be picked and included into an update. Only after all anti-virus or anti-spyware programs on all users' PCs are updated it is possible to protect them against this particular piece of malware. Poor consolation for those unlucky ones who were hit by a new kind of malware FIRST.
These e-mails contain dangerous malware-laden attachments, or links to web sites hosting Trojan horses. When such an attachment is opened or a link is clicked, a malicious program installs the Trojan onto the users' machines. These Trojans can be configured to transmit information via ports used for a common service, like TCP port 80, which is assigned to Web traffic. That's why firewalls are helpless against them.
Second, this time the e-mails are TARGETED -- sent to specific recipients. Their subject lines often have something to do with the user's work or interests.
What the criminal can do when the attachment is opened? He can: (Quote from the alert issued by US-CERT)
CERT made recommendations for system administrators on how to prevent this kind of Trojan horse attacks. You can get the complete list from: http://www.us-cert.gov/cas/techalerts/TA05-189A.html
As for us ordinary Web users -- to lessen the risk of these attacks we all should:
And, of course, be more cautious about everything which appears in our inboxes.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. This company provides software capable of disabling even "tailor-made" information-stealing modules, which can be hidden inside spyware as well as viruses, worms and Trojans.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Over £5 billion pounds was spent on online shopping in... Read More
Credit card fraud is a growing problem for online businesses... Read More
If spyware were a person and he set himself up... Read More
Fishing on the Internet has come a long way. However,... Read More
The top five online scams on the Internet hit nearly... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Computer infections can be broken up into 4 main categories... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
By browsing a web page, you could infect your computer... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
If you are a parent, as am I, I think... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Phishing is a relatively new form of online fraud that... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
First off I should explain what phishing is. Phishing is... Read More
Spyware and adware are becoming major problems for online surfers... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
There are several basic concepts to keep in mind when... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Huge number of spyware software applications are available in the... Read More
When the Internet first came about, it was realized it... Read More
As you know, this time the virus under the name... Read More
The Internet is a vast International Network of people and... Read More
Only the top spyware removers are successful at detecting and... Read More
A few nights ago I received an email from "2CO"... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Imagine this ? you open up your email box and... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Every day millions of people go online to find information,... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
During the release of a new software product specialized to... Read More
The Internet is a vast International Network of people and... Read More
Microsoft routinely releases new security updates, many of which are... Read More
If you know what is the 'Fishing' then it's very... Read More
Ok, ok, I know you've seen them. All those pop... Read More
A new variation of the Nigerian Scam theme ... Read More
If you use emails actively in your communication, you must... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Ebay is a great site and is used by many... Read More
As the number of people using the Internet as an... Read More
No longer are viruses the only threat on the internet.... Read More
We all know that it's dangerous to use the same... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
You and I are a lot alike. We are both... Read More
Computer infections can be broken up into 4 main categories... Read More
First I would like to stress I am condoning the... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Huge number of spyware software applications are available in the... Read More
There you are busily typing away on your PC or... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Viruses are, however, not the only malicious software programs out... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
You can detect spyware online using free spyware cleaners and... Read More
These six ways to prevent identity theft offer you valuable... Read More
Pharming is one of the latest online scams and rapidly... Read More
When we think of adware, what comes to mind are... Read More
Internet Security |