Hackers Write Spyware For Cash, Not Fame - InformationWeek
IoT
IoT
News
News
4/4/2005
02:14 PM
50%
50%

Hackers Write Spyware For Cash, Not Fame

More than 70% of virus writers are now writing spyware under contract, one more piece of evidence that hacking has evolved from mischievous hobby to money-making criminal venture.

More than 70 percent of virus writers are now writing spyware under contract, one more piece of evidence that hacking has evolved from mischievous hobby to money-making criminal venture, a security firm reported Monday.

Tel Aviv-based Aladdin Knowledge Systems said its analysis showed that spyware is the favorite among malware writers, since it lets them re-wrap their own "technology" and sell it, or even introduce their own money-making ventures.

"We analyzed all the viruses we received during the past six months, and found that 70 percent contained some sort of spyware module or component," said Shimon Gruper, the vice president of technologies in Aladdin's eSafe unit. "Writers have definitely moved from creating simple viruses to sophisticated 'machines' designed to hijack computers and the information on them."

The bulk of the spyware being created by hackers, said Gruper, linked to organized crime. "They're doing it for financial gain, pure and simple," said Gruper. "Unlike in the past, when hackers were mostly 'script kiddies' who had nothing better to do, it's quickly becoming more of an organized crime venture."

Gruper's take mirrors that of most security analysts, who have been tracking a shift in hacker motivation over the past 12 to 18 months. Symantec, for instance, noted in its recent Internet Security Threat Report that "the use of malicious code for profit appears to be an increasing concern," particularly in bot networks.

Aladdin didn't concentrate on bots, but instead did detailed comparisons of spyware it found on sex-related Web sites, and found, Gruper said, that most shared multiple characteristics. "We believe that the same programmers wrote the bulk of the spyware being planted by these sex sites," he said.

Gruper's security team also found other connections between the viruses and worms it studied, and much of the spyware it analyzed. "When we started tracking spyware, we suspected that this was a trend, hackers turning to spyware for profit. After we decoded the viruses and compared their code with that of spyware, we confirmed the similarities. There were a lot of similar components in both the viruses and in the spyware."

Aladdin, added Gruper, is confident that even more spyware applications will be linked to organized crime in the future, such spyware created by new alliances of those with the technical resources (hackers) and those with the resources to turn stolen data into cash (criminals).

One thing that Aladdin's not yet seen, said Gruper, is a true blend of virus/worm and spyware. In that scenario, worms would be built to exploit known vulnerabilities or try to trick users into opening file attachments that would then infect systems with spyware.

"It's certainly possible, but most companies have anti-virus defenses that are hard to penetrate," he said. "Yet very few companies have Web browsing content protections."

The most likely exploitation route for spyware will remain malicious Web sites, where visitors are infected with spyware, often via vulnerabilities in Microsoft's Internet Explorer, said Gruper. "These people are professionals," concluded Gruper, "trying to do very malicious things."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
2018 State of the Cloud
2018 State of the Cloud
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Register for InformationWeek Newsletters
White Papers
Current Issue
The Next Generation of IT Support
The workforce is changing as businesses become global and technology erodes geographical and physical barriers.IT organizations are critical to enabling this transition and can utilize next-generation tools and strategies to provide world-class support regardless of location, platform or device
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll