Results 1 to 3 of 3

Thread: More Security Attacks Motivated By Greed, Symantec Reports

  1. #1
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323

    More Security Attacks Motivated By Greed, Symantec Reports

    Somehow this doesn't surprise me. Given that this is the "Microsoft Society" (point and click everything, make it easy), people are always looking for ways to make cash. It is interesting to note the believed time of full disclosure to exploit is about 6 days. So basically, software manufacturers would have about 6 days to release a patch and users/admins have that time to implement it. If an attacker wanted to be fully successful with his/her exploit, he'd DOS their patch release system for just over a week.

    Source: SecurityPipeline

    More Security Attacks Motivated By Greed, Symantec Reports

    The overall daily volume of attacks is declining, but profit-motivated attacks and bots are increasing.

    By George V. Hulme

    There's good news and bad news on the security front. Internet security company Symantec Corp. on Monday released its Internet Security Threat Report, which provides a six-month snapshot of security events the vendor monitored for the first six months of 2004. The report is derived from the monitoring of 20,000 security devices, such as intrusion-detection systems and firewalls, in 180 countries, from Symantec's managed-security-services and DeepSight Threat Management System clients.

    First the good news: The report shows an overall decline in the average daily volume of attacks. For the period of July through December 2003, Symantec calculated a daily attack rate of 12.6. From January through June 2004, the daily attack rate was 10.6. Symantec attributes the drop to a decline in Internet-based worm attacks during the first half of this year compared with other periods.

    That's the end of the good news. Now for the bad news.

    "We're seeing an increase in profit-motivated attacks," says Vincent Weafer, senior director of Symantec's virus research team. That could be why the security company is reporting that attacks aimed at E-commerce sites rose from 4% of overall attacks to 16%. Other trends that point to attacks for profit include the increase in phishing scams and spyware designed to pilfer user names, passwords, and financial information, Weafer says.

    Another serious threat is the growth of so-called bot networks, or computers infected with malicious code that can take over the machines and use them to launch attacks on other computers. At the beginning of this year, the company monitored nearly 2,000 such networks. That figure jumped to 30,000 by June. On one day, the company saw a spike of 75,000 bot-infected computers. These bot networks are often used to launch massive distributed denial-of-service attacks that crush networks under a swarm of bogus traffic.

    Other highlights of Symantec's report include:

    The January 2003 SQL Slammer worm lives on. About 15% of Internet-connected systems launching attacks did so with SQL Slammer-related attacks.

    The average time from the public disclosure of a software vulnerability to the release of attack tools designed to exploit it is 5.8 days.

    During the first half of 2004, roughly 48 new software vulnerabilities were disclosed each week.

    Symantec says that 70% of the new vulnerabilities disclosed are considered "easy to exploit."
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  2. #2
    Senior Member
    Join Date
    Nov 2001
    Posts
    1,255
    Any way to make a quick buck.

    As a contrast to generic phishing/scamming/social engineering, consider the targeted specific trojan that was used to essentially steal the source to Half-Life 2. I think far more dangerous are viruses entirely engineered to target a company and steal trade secrets and/or financial data. The quick buck can be made via phishing, scamming, and social engineering. The big buck can be made through targeted attacks like:
    http://computercops.biz/article3534.html
    http://www.securityfocus.com/news/7160
    Chris Shepherd
    The Nelson-Shepherd cutoff: The point at which you realise someone is an idiot while trying to help them.
    \"Well as far as the spelling, I speak fluently both your native languages. Do you even can try spell mine ?\" -- Failed Insult
    Is your whole family retarded, or did they just catch it from you?

  3. #3
    PHP/PostgreSQL guy
    Join Date
    Dec 2001
    Posts
    1,164
    Looking at companies like Mozilla that are actively offering money for "critical" security bugs that meet a list of requirements, this is to be expected now. If they can do it, why not anyone else? I see some companies stepping up and saying "Hey, we want a better product and are willing to pay out on legit un-exploited bug finds that are critical" and I see other companies not doing so and hence, "threat" emails to their developing staff saying something like "Hey, I found this huge bug, what's it worth before I release?".

    Mozilla's security bounty program info can be found here and has quite a bit of interesting reads.
    We the willing, led by the unknowing, have been doing the impossible for the ungrateful. We have done so much with so little for so long that we are now qualified to do just about anything with almost nothing.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •