• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Criminal Enterprise or Legit Business? It Can Be Hard to Tell, Cisco Says

    July 20, 2009 Alex Woodie

    In its recently released mid-year security review, Cisco Systems makes the case that online criminals are using more sophisticated tools and methods of attack, and are increasingly using legitimate business techniques to mask their nefarious goals. A good example of this evolution was on display with Conficker, a worm that began circulating in late 2008 and that continues to infect computers to this day.

    When Conficker surfaced late last year and blossomed into the biggest computer worm in more than five years, it took security experts a bit by surprise, according to Cisco, which documented the technology and techniques behind the Conficker outbreak in its mid-year security report.

    Whereas many malware exploits of the past few years have concentrated “up the stack” on vulnerabilities in applications, the Conficker worm represented a shift “back to the future” by taking advantage of older vulnerabilities in Windows. Cisco said this “old school” approach worked well because most security professionals were concentrating up the stack on applications, particularly the popular new Web 2.0 apps.

    Once infected with the Conficker worm, an afflicted PC becomes part of a “botnet” of infected computers that online criminals can use for their malicious purposes. In the case of Conficker, one of the ways the criminals made money was by renting the network of infected PCs to Waledcac, another botnet that utilized the processing and network power of Conficker’s dirty work to spread “scamware.” Scamware refers to a business model that relies on scared individuals to purchase software from the scammers in order to escape infection. This sharing of botnet resources represents a criminal adaptation of the software as a service (SaaS) model.

    Conficker’s hold on infected PCs started to crack when a group of more than 100 concerned organizations gathered together to create the Conficker Working Group. The group worked with computer security professionals (including those at Cisco) and the Internet domain naming organization ICANN to identify and root out domains that the Conficker botnet was using.

    The collaborative approach to thwart Conficker worked and helped to “blunt the impact” of the worm, Cisco says. However, when the criminals behind Conficker realized their techniques had been discovered, they quickly shifted gears and tried different communication methods. While Conficker has been muted to some degree, it continues to spread. As of the end of June, there were still several million computer systems under its control, Cisco says, making Conficker the most prolific worm since the SQL Slammer attack of 2003.

    The case of Conficker shows that vigilance must be maintained as computer criminals continue to adapt to changing circumstances. “We see many signs that criminals are mimicking the practices embraced by successful, legitimate businesses to reap revenue and grow their enterprises,” says Tom Gillis, vice president and general manager of security products for Cisco.

    Cisco also shared details of the inner-workings of a botnet. The company got a glimpse into the underworld phenomenon through conversations with a botnet-running criminal, which Cisco helped bring to justice. The criminal admitted to selling access to his botnet, which was created using instant messaging (IM) spam and associated malware, for 10 cents to 25 cents per infected node. That wasn’t going to make the criminal (who claimed he needed the money to pay for antibiotics for a “sick child”) very wealthy. The guys who made the really big bucks–up to $10,000 per week–were involved in phishing and identity theft scams.

    Cisco asked the criminal why he chose of life of crime, and he responded that, due to his lack of a “decent education,” he wasn’t able to find an above-board job. “In this faltering economy,” Cisco says, “one has to wonder if even well-educated IT experts with no criminal record will resort to illegal activities, since jobs are so scarce.” (Cisco invites readers to a full-length report, Infiltrating a Botnet, at its Web site.)

    Another example of the blending of the techniques of criminals and legitimate businessmen is the phenomenon known as “spamdexing.” Just as legitimate companies will try to boost their search engine rankings through numerous techniques, such as adding a slew of keywords to the bottoms of their Web pages to get on more search indices, online ne’er-do-wells are also using these techniques to bolster their search results.

    However, instead of getting legitimate Web pages or download when clicking through, the unsuspecting victims of spamdexing get a disk full of malware for their troubles. This approach is working because of the apparently innate human tendency to trust the top 10 results of a Google search more than the bottom 10 results.

    While criminal outfits have been masquerading as legitimate groups since the dawn of time, use of the tactic is accelerating on the Internet, explains Patrick Peterson, Cisco fellow and chief security researcher.

    “Securing the Internet has long been a moving target as criminals develop increasingly sophisticated ways to breach corporate networks and obtain valuable personal data,” Peterson says. “What is striking in our latest findings is how, in addition to using their technical skills to cast a wide net and avoid detection, these criminals are also demonstrating some strong business acumen.

    “They are collaborating with each other, preying on individuals’ greatest fears and interests, and increasingly making use of legitimate Internet tools like search engines and the software-as-a-service model,” Peterson continues. “Some also continue to succeed using well-documented methods that in recent years have been downplayed as threats given the preponderance of new tactics. With criminals being so quick to identify weaknesses both in online networks and in consumers’ psyches, businesses need to adopt ever more advanced ways to fight cybercrime and remain vigilant across all attack vectors.”

    Other big areas of concern for security professionals are mobile devices. The rapidly growing popularity of mobile, network-connected devices is also proving irresistible to online criminals, Cisco reports. Since the start of the year, at least two or three new campaigns have surfaced every week targeting handheld mobile devices, says Cisco, which calls the 4.1 billion mobile phone subscriptions worldwide a “new frontier for fraud.”

    Disgruntled employees and malicious insiders are also taking their tolls on the health of the world’s computer systems. Cisco detailed several examples of insider fraud this year, including an employee at the Federal Reserve Bank of New York, who, along with his brother, used stolen identities to receive $73,000 in student loans. The brother also used stolen identities for a boat loan in New Jersey, Cisco says. Also occurring in April was the case of a former employee of New York’s Department of Taxation and Finance, who allegedly spent more than $200,000 on credit cards obtained using stolen personal data.

    All is not doom and gloom, however, and Cisco reports several bright spots in the ongoing fight against computer fraud. The company reports a collaborative approach helped to stop the Srizbi/Reactor Mailer botnet, which had been one of the world’s biggest spammers. A coordinated campaign helped to identify the company behind the Srizbi/Reactor Mailer botnet, and it was shut down in November. When the organization resurfaced in Estonia and tried to rebuild its network, it was subsequently disabled by Microsoft and its Malicious Software Removal Tool (MSRT), which it updates every Patch Tuesday.

    Security experts simply need to work harder if they’re going to keep up with their criminal counterparts. That is a huge challenge, especially as the lines between legitimate businesses and criminal enterprises continue to blur and attacks become increasingly sophisticated. On top of that, security pros must keep in mind all of the old vulnerabilities that are still out there (like the one Conficker exploited), while keeping an eye on the ever-present insider threat and complying with the ever-growing number of regulations.

    Yeah, it’s a tough, unforgiving job, with the greatest achievement occurring when nothing happens. So go give your organization’s security guy or gal a big hug, because they probably need it.

    A PDF of Cisco’s 32-page Midyear Security Report can be downloaded at cisco.com/web/about/security/intelligence/midyear_security_review09.pdf.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 27 -- July 20, 2009

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    JDA Plots Course Forward for MMS, and–Surprise–It’s Java IBM Kills Secure Perspectives Tool

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 27

This Issue Sponsored By

    Table of Contents

    • Sundry Power Systems i Storage Announcements
    • Servers Slammed in IBM’s Second Quarter
    • IBM Sunsets More Power Systems Features
    • As I See It: Injured Wing
    • Fincham Rides Point for iManifest EMEA
    • IT Organizations Tuning Up Employee Recruitment Efforts
    • Sun Shareholders Vote to Sell to Oracle
    • IBM Cranks Out Power Systems i Redbooks
    • Criminal Enterprise or Legit Business? It Can Be Hard to Tell, Cisco Says
    • Pat Townsend Secure with New President

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Public Preview For Watson Code Assistant for i Available Soon
    • COMMON Youth Movement Continues at POWERUp 2025
    • IBM Preserves Memory Investments Across Power10 And Power11
    • Eradani Uses AI For New EDI And API Service
    • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
    • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
    • Fresche Overhauls X-Analysis With Web UI, AI Smarts
    • Is It Time To Add The Rust Programming Language To IBM i?
    • Is IBM Going To Raise Prices On Power10 Expert Care?
    • IBM i PTF Guide, Volume 27, Number 20

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle