Computer Crime Research Center

etc/pirate_b.jpg

Hackers seek money gain

Date: September 19, 2005
Source: REUTERS
By: Michael Kahn

SAN FRANCISCO (Reuters) - Computer hackers seeking financial gain rather than thrills or notoriety are increasingly flooding the Internet with malicious software code, according to a semi-annual report issued on Sunday.

Symantec Corp.'s Internet Security Threat Report said during the first half of 2005 the number of new viruses targeting Microsoft Windows users jumped 48 percent to nearly 11,000 compared to the previous six months as hackers used new tools and a growing sophistication to create malicious code.

The latest report by the world's biggest security software maker also found that viruses exposing confidential information made up three-quarters of the top 50 viruses, worms and Trojans, up from 54 percent in the last six months of 2004.

It also said an increasing amount of menacing software allowed spam to be relayed automatically from computer to computer. These so-called "Trojan" programs can download and install adware to display pop-up ads in a user's Web browser.

More so-called robot, or "bot" networks, which are created when a hacker illegally gains control of a large number of computers, are now available for sale or rent in the underworld of the Internet, Symantec said.

"As financial rewards increase, attackers will likely develop more sophisticated and stealthier malicious code that will attempt to disable antivirus, firewalls, and other security concerns," the report said.

Vincent Weafer, a security expert at Symantec, said early generations of cybervandals tended to unleash viruses as a way to bolster their reputations in the murky hacker world but now the motivation has turned to financial gain using more targeted malicious software.
Original article



Add comment  Email to a Friend

Discussion is closed - view comments archieve
2007-02-26 03:14:34 - The information I found here was rather... uomo
2007-02-22 10:54:54 - Nice site you have!... dizionario
Total 2 comments
Copyright © 2001-2013 Computer Crime Research Center
CCRC logo