Welcome!

Security Authors: Elizabeth White, Gilad Parann-Nissany, Bill Mann, Rex Morrow, Datical, Liz McMillan

Related Topics: Security

Security: Article

The Growth of Cybercrime

More people participate in cybercrime; threats continue to grow and evolve

Cybercrime saw significant growth in 2009. It increased in prevalence and geographic spread. The only thing that didn't grow was the skill level required to participate. It was easier for non-skilled attackers to conduct sophisticated attacks because of the availability of toolkits. The increase in manpower has led to an increase in most areas of cybercrime.

The growth of cybercrime has come despite a global recession that has stunted the growth of almost every other industry. The growth of cybercrime has been fueled by an increase in Internet users, especially those in developing countries.

However, businesses can protect their information from these pervasive dangers. Understanding the threat landscape is the first step. The following highlights from the Symantec Internet Security Threat Report XV can help organizations understand just what they're up against.

Cybercrime Keeps Growing
Malicious code is as prominent as ever. In 2009, Symantec identified more than 240 million distinct new malicious programs - a 100 percent increase over 2008. Last year Symantec blocked an average of 100 potential attacks per second.

Compromised confidential information continues to be an issue. Sixty percent of all data breaches that exposed identities were the result of hacking. This problem is not limited to a few larger enterprises. According to the Symantec State of Enterprise Security Report, 75 percent of all companies surveyed experienced some sort of cyber attack during the last year.

Cybercrime is a universal problem. Attackers have moved from using simple scams to launching highly sophisticated campaigns targeting some of the world's largest corporations and government entities. The scale of these attacks and the fact that they come from all over the world makes this an international problem requiring the cooperation of the private sector and global governments.

Less Skill Is Required to Engage in Cybercrime
The emergence of attack toolkits has made cybercrime available to anyone regardless of their computer knowledge and expertise. Novice computer users can purchase a kit and almost immediately begin deploying sophisticated and varied threats. Toolkits such as Zeus can be purchased for as little as $700. Some toolkits allow customization, resulting in many variants being created. Because there are an increasing number of cybercriminals entering the space, the number of threats is increasing and the number of people being affected is increasing as well.

Underground Economy a Bull
Credit cards and bank accounts continued to be the most advertised items on the underground economy in 2009 - illustrated in part by a notable increase in credit card dumps. Such dumps, which are sometimes referred to as cloned credit cards, increased by 150 percent from 2008 to 2009.

Social engineering tactics have changed to take advantage of the evolving financial landscape. More malicious messages incorporate themes such as refinancing loans, consolidating debt, reducing credit card interest rates, etc.

Enterprises Subject to More, Targeted Attacks
Cyber attacks are not just more sophisticated, they're also much more targeted. Many of them are full-fledged yet subtle campaigns. Cyber attacks remain undetected to penetrate deeply into the corporate network. While these targeted attacks have been occurring for several years, they have taken center stage recently, with incidents such as Hydraq.

Targeted attacks use zero-day vulnerabilities and spear-phishing type attacks. Attackers usually research a company and its employees by gathering information from corporate websites, news articles, social networks and other sites. Many targeted attacks aim to steal information about the organization's customers and employees, but other information - like intellectual property and corporate strategies - are also targeted.

Web-Based Attacks Are the Biggest Threat - and Are Getting Bigger
Four out of the top five attacks in 2009 targeted client-side vulnerabilities in widely used applications such as Internet Explorer and PDF readers. Suspicious PDF file downloads were the largest threat and accounted for 49 percent of all Web-based attacks, up from 11 percent in 2008.

Web browsers are also vulnerable - of the 374 vulnerabilities documented in Web browsers in 2009, 14 percent of them remain unpatched by the vendors. Firefox had the most vulnerabilities, but Internet Explorer was the most attacked. That difference illustrates cybercriminals' infatuation with market share.

What It Means
This data, as well as other information in the Symantec Internet Security Threat Report, offers a perspective that can change the way users and businesses operate. It is a framework for understanding what's out there and how to navigate it.

For businesses, such navigation includes employing strategies designed to give in-depth defense, including multiple, overlapping and mutually supportive defensive systems to guard against single-point failures in any specific technology or protection methodology. Security provided by solutions such as antivirus software, firewalls and intrusion detection are crucial if an organization wants to protect its assets and its employees.

Besides ensuring personal computers and networks are protected, individual users also need to use good judgment. If websites are untested or seem questionable, users need to be alert and perhaps even stay away from those sites. Another precaution to consider is disabling scripting and active content when casually browsing the Web.

Cybercriminals are getting more sophisticated, but knowing what they are up to allows businesses and individuals to place themselves strategically in the safest position possible. If you implement the right policies within your organization and use the tools that exist, you can help guard against malicious software and keep your organization's infrastructure, and the information within, safe from cybercriminals.

More Stories By Marc Fossi

Marc Fossi manages research and development for Symantec Security Response where his primary role is executive editor of the Symantec Internet Security Threat Report. The Internet Security Threat Report offers analysis and discussion of Internet threat activity and covers Internet attacks, vulnerabilities, malicious code, phishing, spam and security risks, as well as future trends.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com), moderated by Ashar Baig, Research Director, Cloud, at Gigaom Research, Nate Gordon, Director of T...

ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's platform-as-a-service. The new platform enables developers to build ap...

Focused on this fast-growing market’s needs, Vitesse Semiconductor Corporation (Nasdaq: VTSS), a leading provider of IC solutions to advance "Ethernet Everywhere" in Carrier, Enterprise and Internet of Things (IoT) networks, introduced its IStaX™ software (VSC6815SDK), a robust protocol stack to simplify deployment and management of Industrial-IoT network applications such as Industrial Ethernet switching, surveillance, video distribution, LCD signage, intelligent sensors, and metering equipment. Leveraging technologies proven in the Carrier and Enterprise markets, IStaX is designed to work ac...
"There is a natural synchronization between the business models, the IoT is there to support ,” explained Brendan O'Brien, Co-founder and Chief Architect of Aria Systems, in this SYS-CON.tv interview at the 15th International Cloud Expo®, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
C-Labs LLC, a leading provider of remote and mobile access for the Internet of Things (IoT), announced the appointment of John Traynor to the position of chief operating officer. Previously a strategic advisor to the firm, Mr. Traynor will now oversee sales, marketing, finance, and operations. Mr. Traynor is based out of the C-Labs office in Redmond, Washington. He reports to Chris Muench, Chief Executive Officer. Mr. Traynor brings valuable business leadership and technology industry expertise to C-Labs. With over 30 years' experience in the high-tech sector, John Traynor has held numerous...
Bit6 today issued a challenge to the technology community implementing Web Real Time Communication (WebRTC). To leap beyond WebRTC’s significant limitations and fully leverage its underlying value to accelerate innovation, application developers need to consider the entire communications ecosystem.
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades.
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover how hardware commoditization, the ubiquitous nature of connectivity, and the emergence of Big Data a...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
SYS-CON Events announced today that Windstream, a leading provider of advanced network and cloud communications, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Windstream (Nasdaq: WIN), a FORTUNE 500 and S&P 500 company, is a leading provider of advanced network communications, including cloud computing and managed services, to businesses nationwide. The company also offers broadband, phone and digital TV services to consumers primarily in rural areas.
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufacturer of identification products. We have small-company values with the strength and stability of a major corporation. IDenticard offers local sales, support and service to our customers across the United States and Canada. Our partner network encompasses some 300 of the world's leading systems integrators and security s...
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Smart devices that use wireless technology to exchange information with each other and with their human owners: this is the Internet of Things (IoT). This incredible level of connectivity is already transforming how we exercise, treat diseases, park our cars and access business documents. Research firm IDC projects that the IoT world of connected devices will grow to 200 billion objects by 2020. As more businesses, entrepreneurs and government entities embrace the IoT, more data will be generated daily than the already mind-boggling 2.5 quintillion bytes of data per day. However, even curren...
The Industrial Revolution in the 18th to 19th centuries was a period during which predominantly rural societies in Europe and America became industrial and urban. Advances in steam technology, transportation, mass production and the telegraph collectively transformed industry and society. Today, the Internet of Things (IoT) has the potential to once again transform industry and society just as the Industrial Revolution did. Analyst firm IDC forecasts that the IoT market will grow to $8.9 trillion by 2020 with anywhere between 30 to 50 billion connected autonomous things, making the potential g...
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world. The next @ThingsExpo will take place November 4-6, 2014, at the Santa Clara Convention Center, in Santa Clara, California. Since its launch in 2008, Cloud Expo TV commercials have been aired and CNBC, Fox News Network, and Bloomberg TV. Please enjoy our 2014 commercial.
From a software development perspective IoT is about programming "things," about connecting them with each other or integrating them with existing applications. In his session at @ThingsExpo, Yakov Fain, co-founder of Farata Systems and SuranceBay, will show you how small IoT-enabled devices from multiple manufacturers can be integrated into the workflow of an enterprise application. This is a practical demo of building a framework and components in HTML/Java/Mobile technologies to serve as a platform that can integrate new devices as they become available on the market.
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Located in booth #314, the Bsquare team will present DataV demos and discuss how DataV will help customers put their data to work to improve business outcomes. DataV is unlocking new initiatives across a wide landscape of customers in industries such as industrial manufacturing, transportation, retail and mobile. The solution is designed to complement a new project start or help to enrich an existing machine investment.
The Physical Web incorporates beacons that can be put in any small retail store, for example, so that every store now has "an app" for its customers. In this Birds-of-a-Feather session at Internet of @ThingsExpo, Scott Jenson, Product Designer at Google, will discuss the Physical Web and how it is an open standard so any device can broadcast a URL wirelessly, so any phone/tablet/watch nearby can see, and rank those devices. When the user taps on one, they just go to that web page. It's really that simple. It's about thinking small, enabling micro-information (what is in my prescription bottle...
BSQUARE is a global leader of embedded software solutions. We enable smart connected systems at the device level and beyond that millions use every day and provide actionable data solutions for the growing Internet of Things (IoT) market. We empower our world-class customers with our products, services and solutions to achieve innovation and success. For more information, visit www.bsquare.com.