Biggest security risks you don't know about

I always patch my system and run regular scans with updated antivirus and antispyware scanners. But while researching this story, I got hit by a Trojan horse (Trojan.Winloginhook.Delf.A) that was too new for my antivirus program to catch. Whether it's a new variant on a familiar foe, like a Trojan horse, or a completely new type of attack, today's threats can leave even the most security conscious among us vulnerable.

There are ways we can minimize our risk, however. The first step in mounting a good defence is to know what's coming at you, so I've compiled a list of ten serious security problems that you need to be aware of. To protect yourself, you should of course know how to keep your PC patched and your antimalware tools current. In addition, I'll provide tips to help you avoid these new dangers, and to contain the damage if you do get hit.

1. Zombie PC Armies Set to Attack

Danger level: High | Likelihood: High | Target: Windows users

Botnets were once the province of technically adept criminals who used these remote-controlled armies of infected PCs to send spam, launch Internet attacks, or spread spyware. But now even unsophisticated cyberthugs can generate their own botnet and target your PC, thanks to savvier miscreants who create and sell simple tools for that purpose.

Many people have made a business out of building and selling self-contained bot development kits that let potential herders (as individuals who run a botnet are called) direct their own scam. The kits, which cost anywhere from US$20 to US$3000, permit aspiring criminals to create full-featured botnets and other malicious software, ranging from customizable worms to keyloggers--no techie chops required. "There are tons of [kits]--fifty, sixty, a hundred different ones," says Eric Sites, vice president for research and development at Sunbelt Software, a maker of antispyware programs.

Clever Web Controls

It gets worse. After building a new bot and sending it out to unsuspecting computer users, the wannabe hacker can use sophisticated command-and-control tools to direct the resulting network easily.

Sites's team at Sunbelt, along with the Rapid Response Team at security firm iDefense Labs, has found a new Web-based botnet control they've dubbed Metaphisher. Instead of issuing text commands, herders can use the control's highly graphical user interface, complete with well-designed custom icons and intuitive controls. Point, click, hack.

According to iDefense Labs, Metaphisher-controlled bots have infected more than a million PCs worldwide. The command suite even encrypts communications between itself and the bot herder, and relays information about virtually every aspect of infected PCs to the botmaster--including their geographic location, the Windows security patches installed, and the browsers other than Internet Explorer loaded on each PC.

All these easy-to-use kits and controls undoubtedly contribute to the huge numbers of bot-infected PCs that law enforcement officials have uncovered during recent criminal investigations. For example, Jeanson James Ancheta, a 21-year-old California man, was recently sentenced to 57 months in prison after pleading guilty to violating the federal Computer Fraud and Abuse Act. He had been running a lucrative criminal enterprise based on a botnet with as many as 400,000 infected systems. And three bot herders arrested in the Netherlands last fall are thought to have controlled a staggering 1.5 million zombie PCs.

The low barrier to entry means that even as law enforcement catches some herders, eager newcomers join their ranks every day. "It's amazing how many people get into running botnets just because they see someone else doing it and making money," says Joe Stewart, a senior security researcher at Lurhq, a provider of managed security services.

How It Works: Quick Bot Deployment With Simple Tools

  • A would-be criminal buys a bot-building kit online for a small fee.

  • With no programming skills, the criminal uses his kit to build a new bot not yet known to antivirus makers.

  • The criminal sends his new bot out as an e-mail attachment or plants it on malicious Web sites.

  • The resultant botnet rakes in cash with spam, spyware, and denial-of-service attacks.

Defences

  • Avoid unknown sites and don't click links in unsolicited e-mail. Like most malware, bots tend to be distributed in these ways.

  • Remain suspicious of e-mail attachments, even when a message seems to come from somebody you know. Crooks love to use genuine e-mail addresses in "spoofed" virus-laden e-mail missives.

  • Consider an alternate browser such as Firefox or Opera. IE has been a favorite hacker target.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Andrew Brandt

PC World
Show Comments

Father’s Day Gift Guide

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?