• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Experts Say Botnets, Web Extortion Threats on the Rise

    January 22, 2007 Timothy Prickett Morgan

    Some days, the Internet doesn’t feel like a very safe place. Two reports issued recently are predicting some pretty ugly weather conditions out there in cyberspace looking ahead into third year.

    A report by Trend Micro, which provides security software for servers and PCs, indicated that 2006 saw a “resurgence in malware” and that the “botnet became the hacker’s best friend.” For 2007, Trend Micro is predicting that hackers will continue to ramp up their efforts on these fronts while targeting popular social networking sites.

    What did not happen in 2006, by the way, was widespread virus outbreaks, which we have seen in prior years. Now, hackers are doing more targeted or regional attacks. This is both comforting and alarming at the same time–comforting because you don’t have to cope with a virus outbreak, but alarming if you happen to be the target of the attack. In many cases, these targeted attacks use various pieces of malware and distributed denial of service (DDOS) approaches to try to bring down the systems at a specific company or user group, according to Trend Micro.

    Organized crime is using identity theft and the threat of attacks to conduct corporate espionage, and extortion, and hackers have adopted botnets–remote robots created by viruses and other malware that sit unsuspected on Internet-connected PCs that can do a DDOS–to do havoc.

    The company said that digital threats have increased by an average of 163 percent per year over the past several years. Web-based threats grew 15 percent from 2005, with nearly a half million reports into TrendLabs, the analysis and tracking side of Trend Micro. More than 2 million unique pieces of spam per month and 140,000 unique bots per month flood the Internet.

    “Computer crime has evolved into organized crime, it is no longer the game of individual attackers,” said Jamz Yaneza, the senior threat research analyst at Trend Micro who put together the 2007 threat report. “With money as their main driver, our research has tracked how attacks have moved from being fast and large scale to being cleverly crafted to attack very specific groups under the radar. The unseen Web threat is maturing, and users should be ever-more careful about what they download and install, as blended threats are ever-more cunning in their attempt to steal corporate and personal data or money.”

    Risk Bloggers, a federation of blogs put together by computer and network security experts, released a similar warning report last week, called Ready or Not, Here Comes 2007. “What do you call billions of spam messages, millions of lost customer records, thousands of new viruses, and hundreds of governments asleep at the wheel?” asked the report’s author, Jim Reavis rhetorically. “In our business, we call it 2006, just a normal year in the information security industry.”

    Reavis offers a pretty sobering outlook for security in 2007. “Increasingly, sophisticated criminal organizations are able to exploit technology to stay ahead of corporate and consumer defenses and steal billions of dollars and disrupt whole economies. Botnets, Web application holes and uncontrolled mobility loom large as villains in this tale. Skepticism about the government’s ability to be relevant in face of these challenges abounds.” Reavis is president of Reavis Consulting, which as the name suggests does consulting on security issues and which hosts the RiskBlogger site.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 3 -- January 22, 2007

    Sponsored by
    Midrange Dynamics North America

    Git up to speed with MDChange!

    Git can be lightning-fast when dealing with just a few hundred items in a repository. But when dealing with tens of thousands of items, transaction wait times can take minutes.

    MDChange offers an elegant solution that enables you to work efficiently any size Git repository while making your Git experience seamless and highly responsive.

    Learn more.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Ending Subsystems Properly IBM Lotus Adds Handles to Information Overload

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 3

This Issue Sponsored By

    Table of Contents

    • USPTO Elaborates on 2006’s Issued Patents and Backlog
    • Sun Patches Security Holes in Java Runtime Environment
    • Study Weighs Building Data Centers Against Colocation for SMBs
    • Security Experts Say Botnets, Web Extortion Threats on the Rise
    • New Congress, AT&T Revive the Net Neutrality Issue
    • USPTO Elaborates on 2006’s Issued Patents and Backlog
    • Ask TPM: The Economics of Open Source Software
    • Zend Describes Multiple Instances on i5/OS, Previews RPG Wrapper
    • IBM Closes Out 2006 With a Strong Fourth Quarter
    • Big Blue Readies Revamped Storage for the System i

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Public Preview For Watson Code Assistant for i Available Soon
    • COMMON Youth Movement Continues at POWERUp 2025
    • IBM Preserves Memory Investments Across Power10 And Power11
    • Eradani Uses AI For New EDI And API Service
    • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
    • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
    • Fresche Overhauls X-Analysis With Web UI, AI Smarts
    • Is It Time To Add The Rust Programming Language To IBM i?
    • Is IBM Going To Raise Prices On Power10 Expert Care?
    • IBM i PTF Guide, Volume 27, Number 20

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle