Cyber criminals cloak their tracks

February 13, 2008

The 2007 X-Force Security report from IBM finds a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. According to IBM, by attacking the browsers of computer users, cyber criminals are now stealing the identities and controlling the computers of consumers at a rate never before seen on the Internet.

The study finds that a complex and sophisticated criminal economy has developed to capitalize on Web vulnerabilities. Underground brokers are delivering tools to help obscure or camouflage attacks on browsers, so cyber criminals can avoid detection by security software.

In 2006, only a small percentage of attackers employed camouflaging techniques. This number soared to 80 percent during the first half of 2007 and reached nearly 100 percent by the end of the year. The X-Force believes the criminal element will contribute to a proliferation of attacks in 2008.

Using these techniques, cyber criminals can infiltrate a user's system and steal their IDs and passwords or obtain personal information like National Identification numbers, Social Security numbers and credit card information. When attackers invade an enterprise machine, they could steal sensitive company information or use the compromised machine to gain access to other corporate assets behind the firewall.

"Never before have such aggressive measures been sustained by Internet attackers towards infection, propagation and security evasion. While computer security professionals can claim some victories, attackers are adapting their approaches and continuing to have an impact on users' experiences," said Kris Lamb, operations manager, X-Force Research and Development for IBM Internet Security Systems.

In other findings, for the first time ever, the size of spam emails decreased sharply to pre-2005 levels. X-Force believes the decrease is linked to the drop off of image-based spam.

Source: IBM

Explore further: New Internet technology could aid police, courts and prisons

Related Stories

New Internet technology could aid police, courts and prisons

August 17, 2015

New Internet-based technology may aid criminal justice agencies through tools such as better criminal databases, remotely conducted criminal trials and electronic monitoring of parolees in the community, according to a new ...

Corporate accounts targeted in Dyre Wolf campaign

April 5, 2015

A sophisticated and brazen theft operation has been brought to attention this month by IBM Security, which refers to it as the "Dyre Wolf Campaign." It has been active and successful, having stolen over $1 million from targeted ...

Stolen data finder could reduce harm for companies

June 8, 2015

Business owners don't need IT skills to understand that data breaches are serious. Certainly big names in retail and health care know by experience that such breaches have serious after-effects. Breaches have an impact on ...

IBM Cracks Web 2.0 Security Concerns With 'SMash'

March 13, 2008

IBM today announced new technology to secure "mashups," web applications that pull information from multiple sources, such as Web sites, enterprise databases or emails, to create one unified view. Mashups are attractive for ...

Recommended for you

The ethics of robot love

November 25, 2015

There was to have been a conference in Malaysia last week called Love and Sex with Robots but it was cancelled. Malaysian police branded it "illegal" and "ridiculous". "There is nothing scientific about sex with robots," ...

Tandem solar cells are more efficient

November 23, 2015

Stacking two solar cells one over the other has advantages: Because the energy is "harvested" in two stages, and overall the sunlight can be converted to electricity more efficiently. Empa researchers have come up with a ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.