Cyber crooks cranking out new weapons experts warn

May 23, 2012

Cyber criminals are cranking out new weapons at a brisk pace, tailoring malicious software for a spectrum of gadgets including smartphones, tablets, and Macintosh computers, a security firm said.

A "threats report" released late Monday by McAfee showed that the number of new pieces of malicious code, or "malware," targeting Windows machines in the first three months of this year was the highest in four years.

There was also a rise in malware aimed at running on Google-backed Android software and at based on Apple operating systems, according to the report.

"In the first quarter of 2012, we have already detected eight million new malware samples, showing that malware authors are continuing their unrelenting development," said McAfee Labs Vincent Weafer.

"The same skills and techniques that were sharpened on the PC platform are increasingly being extended to other platforms, such as mobile and Mac."

For a long time concentrated their attention on getting into Windows-powered personal computers (PCs) because the popularity of the operating system meant a wealth of potential victims.

But as Apple and Android devices have caught on around the world, they have emerged as a new target.

"As more homes and businesses use these platforms, the attacks will spread," Weafer said.

While Mac malware has been steadily proliferating, it is still a small fraction of what has been developed for PCs, according to McAfee.

The amount of spam in the quarter dropped to slightly more than a trillion trash messages monthly, with significant decreases in Brazil, Russia, and Indonesia and increases in China, Britain, Germany, Poland, and Spain.

The number of networks of virus-infected computers, referred to as "botnets," rose to nearly five million, with Colombia, Japan, Poland, Spain and the United States seeing the biggest increases.

Hackers use ploys such as booby-trapped emails or links to secretly infect machines with malware that can let them not only steal data or track keystrokes but use the infected machines to launch further attacks.

The United States was the primary address for botnets and cyber attacks in the quarter, McAfee reported.

Cyber crooks sell malware software kits and rent out use of botnets, according to Internet security specialists and law enforcement.

Explore further: Twitter looks to weave into more mobile apps

add to favorites email to friend print save as pdf

Related Stories

Apple out to kill widespread Macintosh virus

Apr 11, 2012

Apple said it is crafting a weapon to vanquish a Flashback virus from Macintosh computers and working to disrupt the command network being used by hackers behind the infections. ...

Hackers pick Google's pocket with Mac virus

May 01, 2012

A virus infecting Macintosh computers is picking Google's pocket by hijacking advertising "clicks," tallying as much as $10,000 daily, according to Internet security firm Symantec.

Spam down but 'zombie' armies growing: McAfee

May 07, 2009

Hackers appear to be beefing up armies of "zombie" computers to recover from a major hit scored in the battle against spam email, according to software security firm McAfee.

Recommended for you

Twitter looks to weave into more mobile apps

7 hours ago

Twitter on Wednesday set out to weave itself into mobile applications with a free "Fabric" platform to help developers build better programs and make more money.

Google unveils app for managing Gmail inboxes

8 hours ago

Google is introducing an application designed to make it easier for its Gmail users to find and manage important information that can often become buried in their inboxes.

Fighting cyber-crime one app at a time

13 hours ago

This summer Victoria University of Wellington will be home to four Singaporean students researching cyber threats. The students have been working with Dr Ian Welch, a lecturer in Victoria's School of Engineering and Computer ...

Is big data heading for its 'horsemeat moment'?

15 hours ago

There have been so many leaks, hacks and scares based on misuse or misappropriation of personal data that any thought that "big data" could provide benefits rather than only opportunities for harm may be ...

User comments : 0