. 24/7 Space News .
Cyberblackmail On The Rise

Networked computers, especially those using common operating systems, are particularly vulnerable and if attacked can become "zombie networks," interacting with other attacked computers in the network using Internet Relay Chat.
by Georgina Voss
UPI Technology Correspondent
London (UPI) May 10, 2006
As illegal moneymaking schemes go, it's certainly not a new one: Crooks steal something of value from their victims and then demand ransom for its safe return. The 21st-century twist in the tale is that now it's not just loved ones and pets being kidnapped, it's also the contents of your hard drive.

According to a new report, a new generation of online criminals is now blackmailing victims for the safe "return" of data that has been stolen and encrypted from their computers.

"Cyberblackmail" is becoming an increasingly common activity, say experts from the software-security industry who have been monitoring virus activity for the first quarter of 2006. In a report released by the Kaspersky Lab, "Malware Evolution: January to March 2006," they stated that this type of cyberblackmail is on the rise as criminals continue to take more aggressive tactics in the quest to turn a profit on illegal software and hacking activities.

In the scenarios described, victims' computers are infected and hacked -- computer viruses are installed on them allowing the criminals to hack into them, and stored personal information is stolen. The virus writers then encrypt this data or corrupt the system information before demanding a ransom for its safe return. The ransoms seen by the Moscow-based Kaspersky research team varied from an almost-reasonable $50 to a much more costly $2,500 demand.

This direct blackmailing of victims marks a shift beyond the silent stealth virus attacks that have become commonplace online. Coordinated attacks for black-market profit using malware -- malicious software such as viruses, spyware and adware -- have become increasingly common over the past five years, infiltrating and damaging users' computers without their consent. The SoBig attacks on Microsoft computers in August 2003 and the MyDoom attacks in January 2004 are two examples of recent wide-scale devastating hits. Networked computers, especially those using common operating systems, are particularly vulnerable and if attacked can become "zombie networks," interacting with other attacked computers in the network using Internet Relay Chat.

Networks of bots have been offered for hire by hacking groups and can be used for wide-scale spamming, phishing for passwords and bank-account details, or purely to bring down a rival's Web site. While devastating, these previous attacks have until now also been comparatively surreptitious -- personal data has simply been quietly stolen for use on the black market with the only obvious signs of theft occurring when the unexpectedly large credit-card bill turns up.

The move to directly contact victims to demand money seems to be part of a larger trend in aggressiveness within the illegal malware communities that are no longer satisfied with the profits to be gained from passive infection of customers. Greed is driving the hard-line tactics that are being adopted to increase the effectiveness of other malware attacks to gain greater illegal revenue. Groups of virus writers are now increasingly banding together to form new groups and creating malware packages consisting of multiple programs. Although industry reports from 2005 showed an increase in the focused attacks on governments and financial institutions, gangs are also turning on each other and writing malicious programs to destroy software developed by rivals.

The current spate of cyberblackmail may be less of a problem than the blackmailers would have their victims believe. The Kaspersky researchers found that they and other software-security firms were able to restore most victims' encrypted data to its original, usable format. But they warned that this is part of the ongoing race in software development between legal and illegal firms and that hackers are using progressively more sophisticated encryption systems that are more difficult to break. Criminals are also now focusing their sights on mobile tools such as PDAs with the use of crossover viruses such as Cxivr, which scans the operating systems of PCs and uses Microsoft ActiveSync to search for mobile devices. Targets of attacks are also shifting to government-owned banks, e-trading portals and the military.

Despite the advances in software and the widening target base, the advice for avoiding such attacks remains the same as it ever has: Avoid downloading files from untrusted sources such as unwarranted e-mails, run up-to-date anti-virus protection and make regular backups.

Source: United Press International

Related Links
-



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Iran To Battle Satellite Dish Owners
Tehran (AFP) May 09, 2006
Iran is to launch a fresh crackdown on people owning satellite dishes and receivers, national police chief Esmail Ahmadi-Moqadam was quoted as saying Monday.







  • NASA Cannot Accommodate Indian Astronaut Aboard Shuttle
  • Aquanauts Learn About Teamwork And Task Performance For The Moon And Mars
  • UP Aerospace Offers Round-trip Payload Space Flights Directly to the Public
  • Iranian-American Woman In Line To Be Next Space Tourist

  • Spirit Takes A Winter Break From Travels But Remains Busy
  • Opportunity Within Sight Of Victoria
  • Mars Drilling Tests Will Seek Knowledge And Resources
  • Spirit Looks Back Up Husband Hill

  • Zenit Rocket Will Power AsiaSat 5 Launch
  • Defence Minister Expedites Preparations For Launching Military Satellite
  • Successful Launch Of Swedish Maxus 7 Sounding Rocket
  • Sea Launch Contracts To Launch Intelsat Americas-9

  • Tibet Provides Passage For Chemicals To Reach The Stratosphere
  • Raytheon Tests Advanced Space-Based Weather Sensor
  • African Wetland Managers Armed With New Technology
  • ESA To Host Atmospheric Science Conference

  • New Horizons Taking Exploration To Edge Of Sol
  • Xena Poses A Bright Mystery
  • Tenth Planet Only Slightly Bigger Than Pluto
  • New Horizons Payload Gets High Marks on Early Tests

  • Astronomers Find Two New Milky Way Companions
  • ESO Detects Most Distant Hydrogen Cloud
  • Milky Way A Field Of Streams
  • Recycled Radio Array Examines Interstellar Gas With Sharpened Eyes

  • China To Launch Satellites For Lunar Surveying
  • India Hoping To To Unveil Space Prowess Before NASA
  • Scientists Working To Help Astronauts To Breath Moon Dust
  • NASA Announces Lunar Lander Analog Competition Agreement

  • Novariant And Wenco Deliver New Positioning Applications For Open Cut Mines
  • Magellan RoadMate First To Offer Traffic RDS Capabilities
  • Ekahau Asset Tracking Technology To Streamline Ground Support For Air Force
  • GPS-Guided Parachutes Increase Safety In Resupply

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2006 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA PortalReports are copyright European Space Agency. All NASA sourced material is public domain. Additionalcopyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement