Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Cyber crime lords using big business tactics: Cisco
by Staff Writers
San Francisco (AFP) July 14, 2009


Cyber criminals are aping executives when it comes to sales, marketing and risk management in the world of online treachery, according to a report networking giant Cisco released Tuesday.

"A lot of techniques they are using today are not new; it is really about how they may be doing some of the same old things," said Cisco chief security researcher Patrick Peterson.

"The novel thing is that they have taken the Harvard Business School, General Electric board room business training and applied it to their old techniques."

The California technology firm specializing in computer networking gear summarized current threats in a "Midyear Security Report" that concludes hackers are increasingly operating like successful businesses.

Peterson cited how cyber hackers capitalized on interest in the death of pop icon Michael Jackson in late June.

Disasters, celebrity doings and other major news is routine fodder for bogus emails and websites booby-trapped with computer viruses, but in the case of Jackson's death, crooks cranked out fake news stories to dupe readers.

"They had their criminal copy editors working on copy for the story as fast as it happened," Peterson said.

"They brought the Jackson story to market in a way that rivals media outlets. They have an advantage; they don't have to do any reporting."

Billions of spam messages with links to trick websites or videos promising scintillating Jackson images and information were fired off in the days after his June 25 death, according to Cisco.

"Sales leads" that followed online links were turned into "customers," whose computers were stealthily infected with nefarious codes for stealing data, usurping control of machines or other evil deeds.

Cyber criminals are reportedly embracing a nefarious version of a "cloud computing" trend of offering computer applications online as services.

Commanders of infected computers woven into "botnet" armies rent out illegally assembled networks to fellow criminals for sending spam, launching attacks or other deeds, according to Cisco.

Peterson told of an "anti-anti-virus" online operation called "Virtest" that charges hackers monthly fees to keep them informed about which security firms can detect their malicious programs.

"It's a criminal service," Peterson said of the operation, which appears to be based in Russia. "We've seen lots of examples of criminals sharing tools, but we've never seen a commercial business like this."

Spammers also employ a business marketing practice of packing booby-trapped websites with terms typically used as keywords in various Internet search engines so that their links land high in query results.

Cisco referred to the practice as "Spamdexing."

"Because so many consumers tend to trust and not be suspicious of rankings on leading search engines, they may readily download one of the fake software packages assuming it is legitimate," Cisco said in the report.

Cyber crooks are also hunting for prey in the rapidly expanding population of mobile telephone users by sending trick text messages.

Criminals have taken to sending blanket text messages to numbers based on area codes of local banks directing people to call into a service center to address supposed concerns about their accounts.

Callers are connected to automated voice systems that, feigning to represent the banks, ask people to enter account passwords and other personal information that can later be exploited, Peterson said.

Online social networks, according to Cisco, are becoming popular "customer acquisition" territory for cyber criminals.

"It's big business now to penetrate those networks," said Peterson.

People in online communities are more likely to click on links and download content they believe is from people they know and trust, the report said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Cyberattacks highlight security concerns
Washington (UPI) Jul 10, 2009
Cyberattacks aimed at jamming South Korean Web sites continued Thursday with more private sites being targeted. Thursday's attacks hit one government and six commercial sites, although only two were affected for more than a few hours. At least 27 government and commercial sites in South Korea and the United States have been hit since the denial-of-service attacks began July 4. ... read more


CYBER WARS
Man's first trip to moon recreated for Internet generation

Neil Armstrong: First man on the moon

Buzz Aldrin: Second man to walk on the moon

Astronomy Question Of The Week: How Was The Moon Created

CYBER WARS
The Minerals On Mars Influence The Measuring Of Its Temperature

Mars500 Crew Safely 'Landed'

US Studies Focus On Improving Mars500 Work Performance

Opportunity Examines 'Absecon'

CYBER WARS
UN's "outer space people" tackle asteroids, climate change

Space travel: Did 1969 mark the end of the dream?

US manned space flight in doubt 40 years after moon walk

Space, man's greatest challenge, 40 years after moon walk

CYBER WARS
China tools up for Asian space race

China to launch Mars space probe

China To Launch First Mars Probe In Second Half Of 2009

China Launches Yaogan VI Remote-Sensing Satellite

CYBER WARS
ISS Appearing Nationwide Over July 4 Weekend

Cargo Ship To Undock From ISS, Serve As Technical Platform

Space Station Room With A View

Progress To Undock From ISS June 30

CYBER WARS
ILS And SES Announce Launch Agreement For QuetzSat-1 Satellite In 2011

Space Systems/Loral Delivers AsiaSat 5 To Baikonur

Brazil Plans To Expand Rocket Launching Base At North

Russia launches US radio satellite: report

CYBER WARS
Twin Stars Form Solar System

STScI Joins The Search For Other Earths In Space

Five 'Holy Grails' Of Distant Solar Systems

Planet-Forming Disk Orbiting Twin Suns Revealed

CYBER WARS
Northrop Grumman Awarded Contract To Develop Space Fence Technology

Even More Trash Talk

More Trash Talk

Orbital To Build New Space Science Satellite To Study X-Ray Polarization




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement