Biggest security risks you don't know about

I always patch my system and run regular scans with updated antivirus and antispyware scanners. But while researching this story, I got hit by a Trojan horse (Trojan.Winloginhook.Delf.A) that was too new for my antivirus program to catch. Whether it's a new variant on a familiar foe, like a Trojan horse, or a completely new type of attack, today's threats can leave even the most security conscious among us vulnerable.

There are ways we can minimize our risk, however. The first step in mounting a good defence is to know what's coming at you, so I've compiled a list of ten serious security problems that you need to be aware of. To protect yourself, you should of course know how to keep your PC patched and your antimalware tools current. In addition, I'll provide tips to help you avoid these new dangers, and to contain the damage if you do get hit.

1. Zombie PC Armies Set to Attack

Danger level: High | Likelihood: High | Target: Windows users

Botnets were once the province of technically adept criminals who used these remote-controlled armies of infected PCs to send spam, launch Internet attacks, or spread spyware. But now even unsophisticated cyberthugs can generate their own botnet and target your PC, thanks to savvier miscreants who create and sell simple tools for that purpose.

Many people have made a business out of building and selling self-contained bot development kits that let potential herders (as individuals who run a botnet are called) direct their own scam. The kits, which cost anywhere from US$20 to US$3000, permit aspiring criminals to create full-featured botnets and other malicious software, ranging from customizable worms to keyloggers--no techie chops required. "There are tons of [kits]--fifty, sixty, a hundred different ones," says Eric Sites, vice president for research and development at Sunbelt Software, a maker of antispyware programs.

Clever Web Controls

It gets worse. After building a new bot and sending it out to unsuspecting computer users, the wannabe hacker can use sophisticated command-and-control tools to direct the resulting network easily.

Sites's team at Sunbelt, along with the Rapid Response Team at security firm iDefense Labs, has found a new Web-based botnet control they've dubbed Metaphisher. Instead of issuing text commands, herders can use the control's highly graphical user interface, complete with well-designed custom icons and intuitive controls. Point, click, hack.

According to iDefense Labs, Metaphisher-controlled bots have infected more than a million PCs worldwide. The command suite even encrypts communications between itself and the bot herder, and relays information about virtually every aspect of infected PCs to the botmaster--including their geographic location, the Windows security patches installed, and the browsers other than Internet Explorer loaded on each PC.

All these easy-to-use kits and controls undoubtedly contribute to the huge numbers of bot-infected PCs that law enforcement officials have uncovered during recent criminal investigations. For example, Jeanson James Ancheta, a 21-year-old California man, was recently sentenced to 57 months in prison after pleading guilty to violating the federal Computer Fraud and Abuse Act. He had been running a lucrative criminal enterprise based on a botnet with as many as 400,000 infected systems. And three bot herders arrested in the Netherlands last fall are thought to have controlled a staggering 1.5 million zombie PCs.

The low barrier to entry means that even as law enforcement catches some herders, eager newcomers join their ranks every day. "It's amazing how many people get into running botnets just because they see someone else doing it and making money," says Joe Stewart, a senior security researcher at Lurhq, a provider of managed security services.

How It Works: Quick Bot Deployment With Simple Tools

  • A would-be criminal buys a bot-building kit online for a small fee.

  • With no programming skills, the criminal uses his kit to build a new bot not yet known to antivirus makers.

  • The criminal sends his new bot out as an e-mail attachment or plants it on malicious Web sites.

  • The resultant botnet rakes in cash with spam, spyware, and denial-of-service attacks.


  • Avoid unknown sites and don't click links in unsolicited e-mail. Like most malware, bots tend to be distributed in these ways.

  • Remain suspicious of e-mail attachments, even when a message seems to come from somebody you know. Crooks love to use genuine e-mail addresses in "spoofed" virus-laden e-mail missives.

  • Consider an alternate browser such as Firefox or Opera. IE has been a favorite hacker target.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Andrew Brandt

PC World
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Bitdefender 2019

This Holiday Season, protect yourself and your loved ones with the best. Buy now for Holiday Savings!

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill


I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?