G Data Informe Sobre Software Malicioso Informe Semestral Enero-Junio 2010

Total Page:16

File Type:pdf, Size:1020Kb

G Data Informe Sobre Software Malicioso Informe Semestral Enero-Junio 2010 G Data Informe sobre software malicioso Informe semestral enero-junio 2010 Ralf Benzmüller & Sabrina Berkenkopf G Data SecurityLabs MalwareReport_1_2010 Go safe. Go.safer. G Data. Informe G Data enero-junio de 2010 sobre software malicioso Contenido Resumen.......................................................................................................................................................3 . Programas.maliciosos:.Cifras.y.datos.....................................................................................................4 Software malicioso a raudales ...................................................................................................................................4 Categorías de malware .................................................................................................................................................5 Familias de programas maliciosos ............................................................................................................................6 Plataformas: .Net se amplía ........................................................................................................................................8 Resumen.y.tendencias.2010....................................................................................................................9 Pronósticos ........................................................................................................................................................................9 Hitos.y.tendencias.durante.el.segundo.semestre.de.2010.............................................................10 Enero de 2010 .................................................................................................................................................................10 Febrero de 2010 ............................................................................................................................................................11 Marzo de 2010 ................................................................................................................................................................13 Abril de 2010 ...................................................................................................................................................................15 Mayo de 2010 ..................................................................................................................................................................17 Junio de 2010 ..................................................................................................................................................................18 Copyright © 2010 G Data Software AG 2 Informe G Data enero-junio de 2010 sobre software malicioso Resumen • En la primera mitad del 2010 se ha batido un nuevo record con 1.017.208 nuevos programas dañinos. • En comparación con el semestre anterior, esto supone un aumento del 10%. Si comparamos esta cifra con el semestre correspondiente del año paso, constatamos incluso una subida del 50%. • Según nuestras previsiones se van a llegar a detectar más de 2 millones de nuevos programas maliciosos a lo largo de todo el año 2010. • La categoría de software dañino que ha experimentado un mayor incremento - el 51% - son los programas espía. Aquí merecen mención especial los keylogger y los troyanos bancarios. • Los nuevos programas de adware han descendido en un 40 %. • Genome y Hupigon, las familias de malware más productivas, crearon más variantes que la suma de todos los programas malintencionados del 2007. • Los programas dañinos para Windows son los principales protagonistas con un porcentaje del 99,4%. La proporción de elementos dañinos .NET se ha multiplicado por 3,4, suponiendo ahora el 0,9% del total. También los autores de virus “saben apreciar” las ventajas de .NET. • También prospera el código malicioso para los programas de los entornos Unix y Java. Tendencias • La función principal del software malintencionado era y sigue siendo robar datos. • El adware ha pasado el testigo a los sucedáneos de antivirus y a la extorsión informática. • Cada vez hay más servicios online y funciones que se aprovechan para fines maliciosos. Principales.Hitos • Las redes sociales se convierten en protagonistas por sus numerosas innovaciones, pero también por algunos fallos de protección de datos. A la cabeza: Twitter y el rey de este campo, Facebook. • A la red de bots Mariposa le cortan las alas. La policía española detiene a los tres explotadores. • También la botnet Waledac, uno de las tres más grandes de los EE.UU., cae de lleno en las redes de la policía y 277 dominios punto com son retirados de la red. • El organismo alemán de comercio de derechos de emisión cae víctima de un ataque de phis- hing. Los autores comerciaron con derechos por un valor que ronda los tres millones de euros. • Los archivos en PDF están cada vez más en el punto de mira de los creadores de malware y los avisos sobre vulnerabilidades en los lectores de PDF aparecen con frecuencia creciente. Copyright © 2010 G Data Software AG 3 Informe G Data enero-junio de 2010 sobre software malicioso Programas.maliciosos:.Cifras.y.datos Software.malicioso.a.raudales. 2005 2006 2007 2008 2009 2010 H 1 Diagrama 1: Cantidad anual de nuevos programas dañinos desde 2005 y en el primer semestre del 2010 También en la primera mitad del 2010, con la aparición de 1.017.208 nuevos1 programas perniciosos, se ha superado un 10% la marca del último semestre del año pasado. Esto significa un aumento de más del 50% con respecto al mismo periodo del año pasado. Ya en el primer semestre del 2010 han aparecido más elementos dañinos que en todo el 2008 junto. Hasta finales de año es de prever que se bata la marca de dos millones de nuevos programas maliciosos. Enero Feb Marzo Abril Mayo Junio Julio Agos Sep Oct Nov Dic Diagrama 2: Cifra mensual de nuevos programas de malware durante 2009 y 2010 1 Las cifras en este informe se basan en la detección del malware mediante firmas de virus, que, a su vez, se apoyan en las similitudes del código de los archivos dañinos. Muchos códigos maliciosos se parecen y se pueden agrupar por familias, en las que las pequeñas diver- gencias se consideran variaciones. Los archivos totalmente diferentes fundan nuevas estirpes. El cómputo se basa en nuevas variantes de firmas que se crearon en el primer semestre del 2010. Copyright © 2010 G Data Software AG 4 Informe G Data enero-junio de 2010 sobre software malicioso Categorías.de.malware La proporción de spyware ha crecido un 3,4 % con respecto al último semestre del 2009. Ninguna otra categoría ha experimentado un aumento proporcional tan acusado. Con ello se ha invertido el fuerte retroceso que se constató en el pasado informe G Data sobre software malicioso, pero aún no se ha llegado al porcentaje que tenía este tipo de malware en el mismo periodo del año anterior. En términos absolutos, esta cifra significa un aumento del 51 %. En la categoría del spyware se puede apreciar un crecimiento especialmente acelerado en las subclases keylogger2 y troyanos bancarios3. No ha remitido tampoco la popularidad de los rootkits. Su número aumentó de nuevo 2,6 veces durante el último semestre. Los gusanos, las nuevas estrellas del último Informe G Data sobre software malicioso, truncaron su imparable ascensión y se mantuvieron en el nivel que tenían. El porcentaje de troyanos ha defendido la elevada cota que escaló el semestre pasado. En este grupo se ha multiplicado por diez el número de ransomware ("Secuestro de archivos a cambio de un rescate", programas de secuestro o de chantaje y algunos falsos antivirus) con respecto al mismo periodo del año pasado. La cuota de backdoors bajo un 2,9%, continuando con ello su tendencia a la baja iniciada en el primer semestre del 2009. También se reduce un tercio el número de tools o herramientas, que ahora representan tan solo 1,0 % del total de malware. Pero la reducción más acusada se registra en la cantidad de adware. Con respecto al año anterior (1erSe 2009 frente al 1erSe 2010) hay un 40 % menos, y el porcentaje del total ha bajado del 5,3 % al 2,1 %. Dif..2010. Dif..2010. 1erSe. 1erSe. #.2010. #.2009. 2009. #.2009. 2009. Categoría 1erSe Porcentaje 2°Se Porcentaje 2°Se 1erSe Porcentaje 1erSe Troyanos 433.367 42,6 % 393.421 42,6 % +10 % 221.610 33,6 % +96 % Downloader/ dropper 206.298 20,3 % 187.958 20,3 % +10 % 147.942 22,1 % +39 % Spyware 130.175 12,8 % 86.410 9,4 % +51 % 97.011 14,6 % +34 % Backdoors 122.469 12,0 % 137.484 14,9 % -11 % 104.224 15,7 % +18 % Gusanos 53.609 5,3 % 51.965 5,6 % +3 % 26.542 4,0 % +102 % Rootkits 31.160 3,1 % 11.720 1,3 % +166 % 12.229 1,9 % +155 % Adware 21.035 2,1 % 30.572 3,3 % -31 % 34.813 5,3 % -40 % Herramientas 9.849 1,0 % 14.516 1,6 % -32 % 11.413 1,6 % -14 % Exploits 2.495 0,2 % 3.412 0,4 % -27 % 2.279 0,3 % +9 % Otros 6.751 0,7 % 5.543 0,5 % +22 % 4.593 0,7 % +47 % Total 1.017.208 100,0 % 924.053 100,0 % +10 % 663.952 100,0 % +53 % Tabla 1: Número y porcentaje de nuevas categorías de software dañino en el 2009 y 2010 , así como sus modificaciones 2 2,5 veces en comparación con el segundo semestre del 2009 3 2,2 veces en comparación con el primer semestre del 2009 Copyright © 2010 G Data Software AG 5 Informe G Data enero-junio de 2010 sobre software malicioso Familias.de.programas.maliciosos En atención a sus funciones y características, el código dañino se puede agrupar por familias. Algunas familias se siguen engrosando con nuevas variantes. En el pasado, los programas
Recommended publications
  • Cyber Security Practices and Challenges at Selected Critical Infrastructures in Ethiopia: Towards Tailoring Cyber Security Framework
    ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCES SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK By TEWODROS GETANEH JUNE, 2018 ADDIS ABABA, ETHIOPIA ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCES SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK A Thesis Submitted to School of Graduate Studies of Addis Ababa University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Information Science By: TEWODROS GETANEH Advisor: Tebebe Beshah (PhD) JUNE, 2018 Addis Ababa, Ethiopia ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCE SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK By: Tewodros Getaneh Name and signature of Members of the Examining Board Tebebe Beshah (PhD) __________ _________ Advisor Signature Date Lemma Lenssa (PhD) ___________ __________ Examiner Signature Date Dereje Teferi (PhD) __________ _________ Examiner Signature Date Declaration This thesis has not previously been accepted for any degree and is not being concurrently submitted in candidature for any degree in any university. I declare that the thesis is a result of my own investigation, except where otherwise stated. I have undertaken the study independently with the guidance and support of my research advisor. Other sources are acknowledged by citations giving explicit references. A list of references is appended. Signature: ________________________ Tewodros Getaneh This thesis has been submitted for examination with my approval as university advisor. Advisor’s Signature: ________________________ Tebebe Beshah (PhD) i | P a g e Dedication This work is dedicated to my beloved sister Eleni Getaneh.
    [Show full text]
  • Climate Change Adaptation in the Arab States Best Practices and Lessons Learned
    Climate Change Adaptation in the Arab States Best practices and lessons learned United Nations Development Programme 2018 | 1 UNDP partners with people at all levels of society to help build nations that can withstand crisis, and drive and sustain the kind of growth that improves the quality of life for everyone. On the ground in nearly 170 countries and territories, we offer global perspective and local insight to help empower lives and build resilient nations. www.undp.org The Global Environment Facility (GEF) was established on the eve of the 1992 Rio Earth Summit to help tackle our planet’s most pressing environmental problems. Since then, the GEF has provided over $17 billion in grants and mobilized an additional $88 billion in financing for more than 4000 projects in 170 countries. Today, the GEF is an international partnership of 183 countries, international institutions, civil society organizations and the private sector that addresses global environmental issues. www.thegef.org United Nations Development Programme July 2018 Copyright © UNDP 2018 Manufactured in Bangkok Bangkok Regional Hub (BRH) United Nations Development Programme 3rd Floor United Nations Service Building Rajdamnern Nok Avenue, Bangkok, 10200, Thailand www.adaptation-undp.org Authors: The report preparation was led by Tom Twining-Ward in close collaboration with Kishan Khoday, with Cara Tobin as lead author and Fadhel Baccar, Janine Twyman Mills, Walid Ali and Zubair Murshed as contributing authors. The publication was professionally reviewed by fellow UNDP colleagues, Amal Aldababseh, Greg Benchwick, Hanan Mutwaki, Mohamed Bayoumi, and Walid Ali. Valuable external expert review, comments, and suggestions were provided by Hussein El-Atfy (Arab Water Council), Ibrahim Abdel Gelil (Arabian Gulf University), and William Dougherty (Climate Change Research Group).
    [Show full text]
  • Significant Cyber Incidents Since 2006 This List Is a Work in Progress That We Update As New Incidents Come to Light. If You H
    Significant Cyber Incidents Since 2006 This list is a work in progress that we update as new incidents come to light. If you have suggestions for additions, send them to [email protected]. Significance is in the eye of the beholder, but we focus on successful attacks on government agencies, defense and high tech companies, or economic crimes with losses of more than a million dollars. 1. May 2006. The Department of State’s networks were hacked, and unknown foreign intruders downloaded terabytes of information. If Chinese or Russian spies backed a truck up to the State Department, smashed the glass doors, tied up the guards and spend the night carting off file cabinets it would be an act of war, but when it happens in cyberspace we barely notice. 2. August 2006. A senior Air Force Officer stated publicly that, “China has downloaded 10 to 20 terabytes of data from the NIPRNet (the unclassified military network).” 3. November 2006. Hackers attempted to penetrate U.S. military War College networks, resulting in a two week shutdown at one institution while infected machines are restored. 4. December 2006. NASA was forced to block emails with attachments before shuttle launches out of fear they would be hacked. Business Week reported that the plans for the latest U.S. space launch vehicles were obtained by unknown foreign intruders. 5. 2006. Chinese hackers were thought to be responsible for shutting down the House of Commons computer system. 6. April 2007. The Department of Commerce had to take the Bureau of Industrial Security’s networks offline for several months because its networks were hacked by unknown foreign intruders.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • E-Commerce Security and Fraud Issues and Protections 10
    E-Commerce Security and Fraud Issues and Protections 10 C o n t e n t s Learning Objectives Opening Case: How State University of New York College at Old Westbury Upon completion of this chapter, you will be Controls Its Internet Use ...................................... 458 able to: 10.1 The Information Security Problem .......... 459 1. Understand the importance and scope of security of information systems for EC. 10.2 Basic E-Commerce Security Issues and Landscape ........................................... 465 2. Describe the major concepts and terminol- ogy of EC security. 10.3 Technical Malware Attack Methods: From Viruses to Denial of Service ............ 471 3. Understand about the major EC security threats, vulnerabilities, and technical attacks. 10.4 Nontechnical Methods: From Phishing to Spam and Fraud .................... 476 4. Understand Internet fraud, phishing, and spam. 10.5 The Information Assurance Model 5. Describe the information assurance security and Defense Strategy ................................. 484 principles. 10.6 The Defense I: Access Control, 6. Identify and assess major technologies Encryption, and PKI ................................. 488 and methods for securing EC access and 10.7 The Defense II: Securing communications. E-Commerce Networks ............................. 494 7. Describe the major technologies for protec- 10.8 The Defense III: General Controls, tion of EC networks. Spam, Pop Ups, Fraud, and Social 8. Describe various types of controls and special Engineering Controls................................. 497 defense mechanisms. 10.9 Implementing Enterprisewide 9. Describe consumer and seller protection from E-Commerce Security ............................... 500 fraud. Managerial Issues.................................................. 504 10. Discuss enterprisewide implementation issues Closing Case: How One Bank Stopped Scams, for EC security. Spams, and Cybercriminals ................................. 509 11. Understand why it is so diffi cult to stop computer crimes.
    [Show full text]
  • CIS 381: Social & Ethical Issues of Computing
    CIS 381: Social & Ethical Issues of Computing Security Dr. David Koop D. Koop, CIS 381, Spring 2019 Hackers, Past and Present • Original meaning of hacker: explorer, risk taker, system innovator (e.g. MIT’s Tech Model Railroad Club in 1950s) • Change in meaning from electronics to computers and networks • WarGames (1983): Hacking military supercomputer • Modern meaning of hacker: someone who gains unauthorized access to computers and computer networks [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !2 Password Advice • Do not use short passwords • Do not rely solely on words from the dictionary • Do not rely on substituting numbers for letters • Do not reuse passwords • Give ridiculous answers to security questions • Enable two-factor authentication if available • Have password recoveries sent to a secure email address [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !3 Case Study: Firesheep • October 2010: Eric Butler released Firesheep extension to Firefox browser • Firesheep made it possible for ordinary computer users to easily sidejack Web sessions • More than 500,000 downloads in first week • Attracted great deal of media attention • Early 2011: Facebook and Twitter announced options to use their sites securely • Evaluate: Was this a good action? [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !4 Viruses • Virus: Piece of self-replicating code embedded within another program (host) • Viruses associated with program files - Hard disks, floppy disks, CD- ROMS - Email attachments • How viruses spread - Diskettes or CDs - Email - Files downloaded from Internet [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !5 Worm • Worm: - Self-contained program 7.3 Malware 329 - Spreads via computer network - Exploits security holes W • Tappen's Internet Worm W W - Released worm onto Internet from W MIT computer - Spread to significant numbers of Unix computers W - Infected computers kept crashing or became unresponsive Figure 7.4 A worm spreads to other computers by exploiting security holes in computer networks.
    [Show full text]
  • How to Improve Data Security and Reduce Potential Liability for Data Breaches
    How to Improve Data Security and Reduce Potential Liability for Data Breaches Randy Gainer, Attorney, CISSP February 12, 2014 Topics . The risks of cyber attacks – Identifying threats – Conducting risk assessments . Choosing cost-effective security measures . Evaluating cyber insurance coverage 2 Identifying threats . If your business processes payment cards, card data thieves are targeting your customers’ card data: Trustwave 2013 Global Security Report, 8. 3 Identifying threats . Targeted malware – Deployed by phishing, poisoned websites, poisoned ads, watering hole attacks, and poorly protected third-party access tools. E.g., • Remote access accounts for service vendors that rely on weak passwords; and • Phished credentials for access to the cardholder data environment (“CDE”). 4 Identifying threats . Targeted malware – Programmed to find, copy, store, encrypt, and exfiltrate payment card data – Customized to avoid detection – Allows attacker to persistently communicate with, and exercise command and control of, the malware inside the target network – Permits an attacker to adapt to defenses (e.g., installs multiple backdoors to maintain attacker’s access). 5 Identifying threats . Targeted malware – Used to find assets on the network to steal: Insight Enterprise Intelligence tool. Used with permission. 6 Identifying threats 7 Identifying threats 8 Identifying threats 9 Identifying threats 10 Identifying threats 11 Identifying threats 12 Identifying threats . Issuers, merchants, and acquirers of credit, debit, and prepaid cards experienced gross fraud losses of $11.27 billion in 2012, up 14.6% over the prior year. Card issuers lost 63% and merchants and acquirers lost the other 37%. Business Wire, August 19, 2013, citing The Nilson Report. 13 Identifying threats . Global Payments, Inc.
    [Show full text]
  • Cyberpro December 31, 2009
    Volume 2, Edition 26 CyberPro December 31, 2009 Keeping Cyberspace Professionals Informed Officers The articles and information appearing herein are intended for President educational purposes to promote discussion in the public interest and to Larry K. McKee, Jr. keep subscribers who are involved in the development of Cyber-related concepts and initiatives informed on items of common interest. The Chief Operations Officer newsletter and the information contained therein are not intended to Jim Ed Crouch provide a competitive advantage for any commercial firm. Any misuse or unauthorized use of the newsletter and its contents will result in removal ------------------------------ from the distribution list and/or possible administrative, civil, and/or CyberPro Editor-in-Chief criminal action. Lindsay Trimble The views, opinions, and/or findings and recommendations contained in CyberPro Research Analyst this summary are those of the authors and should not be construed as an Kathryn Stephens official position, policy, or decision of the United States Government, U.S. Department of Defense, or National Security Cyberspace Institute. CyberPro Archive To subscribe or unsubscribe to this newsletter click here CyberPro News Subscription. Please contact Lindsay Trimble regarding CyberPro subscription, sponsorship, and/or advertisement. All rights reserved. CyberPro may not be published, broadcast, rewritten or redistributed without prior NSCI consent. 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace
    [Show full text]
  • Malware Risks and Mitigation Report
    MALWARE RISKS AND MITIGATION REPORT June 2011 BITS A DIVISION OF THE FINANCIAL SERVICES ROUNDTABLE 1001 PENNSYLVANIA AVENUE NW SUITE 500 SOUTH WASHINGTON, DC 20004 202-289-4322 WWW.BITS.ORG BITS Malware Risk and Mitigation Report Table of Contents 1. Executive Summary ..............................................................................................................3 2. Malware Evolution................................................................................................................3 2.1 Malware Categories...............................................................................................................................5 2.2 Malware Example .................................................................................................................................8 2.3 Polymorphic Malware ........................................................................................................................10 3. Malware Supply and Demand ............................................................................................ 10 3.1 The Malware Industry ........................................................................................................................11 3.2 Malware Supply Chain........................................................................................................................13 3.3 Beyond Crime......................................................................................................................................14 4. Malware in Financial
    [Show full text]
  • Reedom from Fear SPECIAL ISSUE
    MAX-PLANCK-GESELLSCHAFT reedom from fear www.freedomfromfearmagazine.org SPECIAL ISSUE CYBERCRIMES Looking for Freedom from Fear - July 2010 - Issue n°7 - Magazine Published by UNICRI, Max Planck Institute, Basel Institute on Governance - Editorial Board: Via Maestri del Lavoro,10, 10127, Turin, Italy Safer Spaces? 7 Hackers Profiling: Terrorist use of Cyberwar: Who Are the the Internet and Myth or Reality? Attackers? Legal Response Marco Gercke Raoul Chiesa Daniel Thelesklaf Bruce Schneier Award notification Congratulations your identity has been sold! All our lauded technological progress -- our very civilization - is like the axe in the hand of the pathological criminal. (Albert Einstein) Over the last years we have witnessed changes as we analyzed criminal trends and elaborated new strategies to confront crime. New scenarios have emerged, which have obliged us to improve knowledge and to rethink strategies. These changes are the direct consequences of a wired world driven by global markets where frontiers are abolished mainly in the name of economics. This new world, dominated by new information and communication technologies, has also redefined the criminals’ profile and their modus operandi. Most of the criminal phenomena we are fighting today are transnational. The network woven by organized crime has also become part of our daily life, it has infiltrated the new information and communication technologies (ICT) and, the more we depend on these, the more we are potential victims. ICTs have expanded our possibilities, but they have also enabled a wide spectrum of offences, and the magnitude of these violations can reach impressive levels through the Internet. Nowadays, security is no longer just an issue in the real world: it is a virtual matter as well.
    [Show full text]
  • Chapter 7: Computer and Network Security
    Chapter 7: Computer and Network Security 1 Chapter Overview • Introduction • Hacking • Malware • Cyber crime and cyber attacks • Online voting 1-2 1- 7.1 Introduction • Computers getting faster and less expensive • Utility of networked computers increasing – Shopping and banking – Managing personal information – Controlling industrial processes • Increasing use of computers → growing importance of computer security 1-3 1- 7.2 Hacking 1-4 1- Hackers, Past and Present • Original meaning of hacker: explorer, risk taker, system innovator – MIT’s Tech Model Railroad Club in 1950s • 1960s-1980s: Focus shifted from electronics to computers and networks – 1983 movie WarGames • Modern meaning of hacker: someone who gains unauthorized access to computers and computer networks 1-5 1- Obtaining Login Names, Passwords • Eavesdropping • Dumpster diving • Social engineering 1-6 1- Password Dos and Don’ts • Do not use short passwords. • Do not use a word from the dictionary. • Do not rely on substituting numbers for letters. • Do not reuse passwords. • Give ridiculous answers to security questions. • Enable two-factor authentication if available. • Have password recoveries sent to a secure email address. 1-7 1- Computer Fraud and Abuse Act • Criminalizes wide variety of hacker-related activities – Transmitting code that damages a computer – Accessing any Internet-connected computer without authorization – Transmitting classified government information – Trafficking in computer passwords – Computer fraud – Computer extortion • Maximum penalty: 20 years
    [Show full text]
  • Selected Papers in Security Studies: Volume 5 Payment Card Fraud: Challenges and Solutions Technical Report
    Selected Papers in Security Studies: Volume 5 Payment Card Fraud: Challenges and Solutions Technical Report UTDCS­34­11 The University of Texas at Dallas Department of Computer Science November 2011 Irina Sakharova and Latifur Khan 1 Selected Papers in Security Studies: Volume 5 Payment Card Fraud: Challenges and Solutions Irina Sakharova and Latifur Khan The University of Texas at Dallas ABSTRACT Payment card fraud is causing billions of dollars in losses for the card payment industry. Besides direct losses, the brand name can be affected by loss of consumer confidence due to the fraud. As a result of these growing losses, financial institutions and card issuers are continually seeking new techniques and innovation in payment card fraud detection and prevention. This paper provides an overview of payment card fraud and begins with payment card statistics and the definition of payment card fraud. It also describes various methods used by identity thieves to obtain personal and financial information for the purpose of payment card fraud. In addition, relationship between payment card fraud detection and terrorism funding is provided. Finally, some solutions for detecting payment card fraud are also given. This is the fifth in a series of reports we are writing on Security Studies and the application of information technology for providing security and combating terrorism at the Cyber Security Research Center. We will include papers on both cyber security and national security. The purpose of these series of reports is to guide us in the technologies we are developing for both cyber security and national security. The technologies include systems for assured information sharing and assured cloud computing and tools for secure social network analysis and data mining for security application such as malware detection.
    [Show full text]