Biggest security risks you don't know about

I always patch my system and run regular scans with updated antivirus and antispyware scanners. But while researching this story, I got hit by a Trojan horse (Trojan.Winloginhook.Delf.A) that was too new for my antivirus program to catch. Whether it's a new variant on a familiar foe, like a Trojan horse, or a completely new type of attack, today's threats can leave even the most security conscious among us vulnerable.

There are ways we can minimize our risk, however. The first step in mounting a good defence is to know what's coming at you, so I've compiled a list of ten serious security problems that you need to be aware of. To protect yourself, you should of course know how to keep your PC patched and your antimalware tools current. In addition, I'll provide tips to help you avoid these new dangers, and to contain the damage if you do get hit.

1. Zombie PC Armies Set to Attack

Danger level: High | Likelihood: High | Target: Windows users

Botnets were once the province of technically adept criminals who used these remote-controlled armies of infected PCs to send spam, launch Internet attacks, or spread spyware. But now even unsophisticated cyberthugs can generate their own botnet and target your PC, thanks to savvier miscreants who create and sell simple tools for that purpose.

Many people have made a business out of building and selling self-contained bot development kits that let potential herders (as individuals who run a botnet are called) direct their own scam. The kits, which cost anywhere from US$20 to US$3000, permit aspiring criminals to create full-featured botnets and other malicious software, ranging from customizable worms to keyloggers--no techie chops required. "There are tons of [kits]--fifty, sixty, a hundred different ones," says Eric Sites, vice president for research and development at Sunbelt Software, a maker of antispyware programs.

Clever Web Controls

It gets worse. After building a new bot and sending it out to unsuspecting computer users, the wannabe hacker can use sophisticated command-and-control tools to direct the resulting network easily.

Sites's team at Sunbelt, along with the Rapid Response Team at security firm iDefense Labs, has found a new Web-based botnet control they've dubbed Metaphisher. Instead of issuing text commands, herders can use the control's highly graphical user interface, complete with well-designed custom icons and intuitive controls. Point, click, hack.

According to iDefense Labs, Metaphisher-controlled bots have infected more than a million PCs worldwide. The command suite even encrypts communications between itself and the bot herder, and relays information about virtually every aspect of infected PCs to the botmaster--including their geographic location, the Windows security patches installed, and the browsers other than Internet Explorer loaded on each PC.

All these easy-to-use kits and controls undoubtedly contribute to the huge numbers of bot-infected PCs that law enforcement officials have uncovered during recent criminal investigations. For example, Jeanson James Ancheta, a 21-year-old California man, was recently sentenced to 57 months in prison after pleading guilty to violating the federal Computer Fraud and Abuse Act. He had been running a lucrative criminal enterprise based on a botnet with as many as 400,000 infected systems. And three bot herders arrested in the Netherlands last fall are thought to have controlled a staggering 1.5 million zombie PCs.

The low barrier to entry means that even as law enforcement catches some herders, eager newcomers join their ranks every day. "It's amazing how many people get into running botnets just because they see someone else doing it and making money," says Joe Stewart, a senior security researcher at Lurhq, a provider of managed security services.

How It Works: Quick Bot Deployment With Simple Tools

  • A would-be criminal buys a bot-building kit online for a small fee.

  • With no programming skills, the criminal uses his kit to build a new bot not yet known to antivirus makers.

  • The criminal sends his new bot out as an e-mail attachment or plants it on malicious Web sites.

  • The resultant botnet rakes in cash with spam, spyware, and denial-of-service attacks.


  • Avoid unknown sites and don't click links in unsolicited e-mail. Like most malware, bots tend to be distributed in these ways.

  • Remain suspicious of e-mail attachments, even when a message seems to come from somebody you know. Crooks love to use genuine e-mail addresses in "spoofed" virus-laden e-mail missives.

  • Consider an alternate browser such as Firefox or Opera. IE has been a favorite hacker target.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Andrew Brandt

PC World
Show Comments


James Cook University - Master of Data Science Online Course

Learn more >


Sansai 6-Outlet Power Board + 4-Port USB Charging Station

Learn more >

Victorinox Werks Professional Executive 17 Laptop Case

Learn more >



Back To Business Guide

Click for more ›

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?