Risk
1/11/2005
04:22 PM
Thomas Claburn
Thomas Claburn
Commentary
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Machine Wars

Cybercrime used to be personal. Today, it's professional and pre-programmed.

Cybercrime used to be personal. Today, it's professional and pre-programmed.Recall computer security expert Tsutomu Shimomura's effort to track hacker Kevin Mitnick in 1994. There was a personal rivalry fit for detective fiction.

But these days, as I discovered researching InformationWeek's upcoming security feature Machine Wars, hacking is automated.

There are many areas where expertise can be automated and made available through software. In medicine, we now have expert systems that automate aspects of the diagnostic process. So perhaps it's no surprise that hackers are releasing tools that automate attacks. But the advent of crime bots also owes something to emergence of organized gangs of cyber criminals. Experts indicate that such groups are increasingly funding the development of worms, viruses, and the like.

The arrest of members of a Russian cyber crime gang last July by the UK's National Hi-Tech Crime Unit and its counterparts in the Russian Federation represents an example of this trend. The gang is believed to have extorted hundreds of thousands of pounds from online bookmakers after crippling their servers with a denial of service attack to demonstrate the dangers of failing to pay protection money.

According to a spokesperson for the UK NHTCU, "The denial of service attacks were launched from compromised machines (ie: zombies) via a botnet."

Like John Henry in his storied race against a steam drill, IT admins are killing themselves trying to keep up.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4725
Published: 2014-07-27
The MailPoet Newsletters (wysija-newsletters) plugin before 2.6.7 for WordPress allows remote attackers to bypass authentication and execute arbitrary PHP code by uploading a crafted theme using wp-admin/admin-post.php and accessing the theme in wp-content/uploads/wysija/themes/mailp/.

CVE-2014-4726
Published: 2014-07-27
Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors.

CVE-2014-2363
Published: 2014-07-26
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.

CVE-2014-2625
Published: 2014-07-26
Directory traversal vulnerability in the storedNtxFile function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to read arbitrary files via crafted input, aka ZDI-CAN-2023.

CVE-2014-2626
Published: 2014-07-26
Directory traversal vulnerability in the toServerObject function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to create files, and consequently execute arbitrary code, via crafted input, aka ZDI-CAN-2024.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.