Cyber criminals cloak their tracks

Feb 13, 2008

The 2007 X-Force Security report from IBM finds a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. According to IBM, by attacking the browsers of computer users, cyber criminals are now stealing the identities and controlling the computers of consumers at a rate never before seen on the Internet.

The study finds that a complex and sophisticated criminal economy has developed to capitalize on Web vulnerabilities. Underground brokers are delivering tools to help obscure or camouflage attacks on browsers, so cyber criminals can avoid detection by security software.

In 2006, only a small percentage of attackers employed camouflaging techniques. This number soared to 80 percent during the first half of 2007 and reached nearly 100 percent by the end of the year. The X-Force believes the criminal element will contribute to a proliferation of attacks in 2008.

Using these techniques, cyber criminals can infiltrate a user's system and steal their IDs and passwords or obtain personal information like National Identification numbers, Social Security numbers and credit card information. When attackers invade an enterprise machine, they could steal sensitive company information or use the compromised machine to gain access to other corporate assets behind the firewall.

"Never before have such aggressive measures been sustained by Internet attackers towards infection, propagation and security evasion. While computer security professionals can claim some victories, attackers are adapting their approaches and continuing to have an impact on users' experiences," said Kris Lamb, operations manager, X-Force Research and Development for IBM Internet Security Systems.

In other findings, for the first time ever, the size of spam emails decreased sharply to pre-2005 levels. X-Force believes the decrease is linked to the drop off of image-based spam.

Source: IBM

Explore further: Wall Street Journal takes computers offline after hacking

add to favorites email to friend print save as pdf

Related Stories

Google eyes Chrome on Windows laptop battery drain

40 minutes ago

Google Chrome on Microsoft Windows has been said to have a problem for some time but this week comes news that Google will give it the attention others think the problem quite deserves. Namely, Google is to ...

Security contest techies say they hacked Tesla Model S

2 hours ago

The good news: Tomorrow's cars are computers on wheels. The bad news: Tomorrow's cars are computers on wheels. Ma Jie, writing in Bloomberg News, reported this week that the Tesla Model S sedan was the target ...

Water problems lead to riots, deaths in South Africa

4 hours ago

Three babies who died from drinking tap water contaminated by sewage have become a tragic symbol of South Africa's struggle to cope with a flood of people into cities designed under apartheid to cater to ...

Recommended for you

Social Security spent $300M on 'IT boondoggle'

2 hours ago

(AP)—Six years ago the Social Security Administration embarked on an aggressive plan to replace outdated computer systems overwhelmed by a growing flood of disability claims.

Six charged in global e-ticket hacking scheme

2 hours ago

Criminal charges were filed Wednesday against six people in what authorities said was a global cyber-crime ring that created fraudulent e-tickets for major concerts and sporting events.

User comments : 0