PCWorld.comComputer Technology newsComputer reviews - desktops, laptops and softwareHow-to guides and PC TroubleshootingHDTV, Digital Cameras and More
Shareware and Freeware FilesPC Diagnostics and Analysis ToolsPC Price Comparison and ReviewsPC World magazine
 Cameras   Notebooks   Desktops   Printers   Monitors   Home Networks   PDAs 

RELATED ARTICLES

RELATED FILES

BARGAIN FINDER
Hand-picked bargains and special offers. Save money on products you want. New listings every day! Check out today's offers.

FREE NEWSLETTERS
Get our weekly news recap or daily downloads digest.

Enter your e-mail:

PRIVACY WATCH
Privacy in a Very Small Package
A USB drive can help you protect your data.
By Andrew Brandt



2004: Good and Bad for Security
 
From a sharp increase in phishing scams to high-profile arrests, here's what made news this year.

Paul Roberts, IDG News Service
Monday, December 27, 2004

Experts agree: 2004 was the best of times and the worst of times for those concerned about security. It was a year with high-profile arrests of virus authors, and the explosion of online crimes, from cyber-extortion to identity theft, a year in which ISPs won millions in damages from spammers, and spam messages increased by 40 percent.

Advertisement

In hindsight, 2004 may be looked back upon as the year that a long tradition of hobbyist hackers and flashy, but harmless, viruses gave way to shadowy, professional online crime syndicates. The professionals were armed with virulent new threats designed to separate Internet users from their cash, according to interviews with leading security experts.

With that in mind, here's a look at some of the most important technology security stories and trends of the last year:

Phishing: For Phun and Profit

Online identity theft through phishing scams was the run-away security story of 2004, due to the explosive growth in such attacks.

Phishing scams are online crimes that use spam to direct Internet users to Web sites controlled by thieves, but designed to look like legitimate e-commerce sites. Users are asked to provide sensitive information, often under the guise of updating account information, which is then captured by the thieves.

E-mail security vendor MessageLabs blocked an insignificant trickle of 279 such scams in September 2003. By September 2004, that trickle swelled to a flood of more than 2 million messages, according to a statement from the company. In all, MessageLabs says it blocked 18 million phishing e-mail messages in 2004.

The Anti-Phishing Working Group watched the number of reported phishing Web sites increase by an average of 28 percent each month between July and November. The average phishing Web site operated for six days before being shut down, according to Peter Cassidy, secretary general of the group.

"Phishing has really exploded, it's been one of the biggest problems we've had," says Mikko Hyppönen of Finnish antivirus company F-Secure.

Achilles, Get Your Gun

Not since the days of Ancient Greece have Trojans been as much a part of popular conversation as they were in 2004, when an explosion in Trojan horse programs turned countless Internet-connected computers into tools for malicious hackers and international online crime organizations.

Carried on the back of e-mail and Internet worms, an eye-popping parade of back door Trojans marched onto vulnerable computers since January.

One typical example is the ubiquitous RBot, a Trojan program that spreads using a number of methods. The program can collect system information, download and execute files, launch a denial-of-service (DOS) attack, and even remotely control a connected Web cam.

RBot-A, the first version of the worm-like Trojan, was identified in March 2004. The latest, RBot RN was identified on December 13, according to U.K. antivirus company Sophos. In just nine months, there were 480 different versions of the Trojan.

Trojan horse and backdoor programs are not new, but the rapid growth in their use in 2004 was a product of cooperation between virus writers, online criminals and spammers, says Jesse Villa, technical product manager at Frontbridge Technologies.

Trojans have been silent actors in a number of high-profile crimes, including the theft in 2003 of source code for the "Half-Life 2" video game. A Trojan horse program named Banker-AJ infected computers and waited until users visited online banking sites, at which point the program logged user keystrokes and captured account information, says Gregg Mastoras, senior security analyst at Sophos.

More Trojans have also led to an increase in the number of "botnets," distributed networks of compromised machines that act as "zombies" in spam campaigns or DDOS (distributed DOS) attacks.

"At the end of last year we knew of about 2000 botnets. Towards the end of this year, we're looking at about 300,000," Villa says.

Those networks range from 100 infected PCs to networks of thousands of zombie computers, which are rented out to aspiring spammers or for targeted DOS attacks used in online extortion rackets, Villa says.

"Bots have largely gone ignored," says Hyppönen. "You don't see alerts on bots, however they have probably been a bigger problem [than viruses]."

Police and Patches

But the news wasn't all bad. While online crimes skyrocketed in 2004, there were also a number of high-profile arrests of those involved in cybercrimes.

In May, German authorities arrested 18-year-old Sven Jaschan, who admitted to creating and releasing the Netsky and Sasser Internet worms, and a 21-year-old German man who admitted to creating the Agobot and Phatbot Trojans.

There were other victories as well, including the June arrest of those believed to be behind the 2003 "Half-Life 2" source code theft and a September arrest of a man believed to be connected to the theft of source code belonging to Cisco Systems. In October, the U.S. Department of Justice arrested 19 people in connection to an online "carding" ring that traded information about stolen identity and credit card information online.

In 2005, some combination of tougher law enforcement and tighter security is the best way to stem the tide of malicious and criminal behavior online, experts agree.

To stop identity theft, banks, e-commerce companies and consumers need to look hard at strong user authentication technology, says Sophos' Mastoras.

"In the [European Union], banks are already moving away from static passwords. I think that will be a trend that will happen in the U.S. as well," he says.

E-mail sender authentication technologies such as Domain Keys from Yahoo and Sender ID from Microsoft need to be broadly adopted--a move that would make life tougher for those behind phishing scams, which often use forged e-mail sender addresses to trick unsuspecting e-mail recipients, says Mastoras.

ISPs also have to begin sharing what they know about Internet attacks and compromised computers on their networks, Villa says.

"This is a long term problem and we have to work together to combat it," he says.








Printer Friendly Version


    PC World's Marketplace



    Special Bonus: Free Software CD-ROM!

    Digital Subscriptions

    Receive 2 RISK-FREE Issues of PC World and 15 FREE Power Guides!
    Enter your trial subscription and you'll receive 2 Risk-Free Issues plus 15 FREE Instant Power Guides and Bonus CD-ROM. If you like PC World, pay just $19.97 for 10 more issues (12 in all). Otherwise, write "cancel" on the bill, return it, and owe nothing.


    Try PC World Risk-Free, just fill in the form and click Submit!
    Name City
    Address 1
    State Zip Code
     
    Address 2 E-Mail (optional)



    Canadian residents, click here | All other foreign residents, click here

    Customer service, click here