{"id":659,"date":"2005-04-30T00:00:00","date_gmt":"2005-04-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/04\/30\/it-vigilance-urged-to-fight-malware-bots-root-kits\/"},"modified":"2021-12-30T11:37:54","modified_gmt":"2021-12-30T11:37:54","slug":"it-vigilance-urged-to-fight-malware-bots-root-kits","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/04\/30\/it-vigilance-urged-to-fight-malware-bots-root-kits\/","title":{"rendered":"IT Vigilance Urged to Fight Malware, Bots, Root Kits"},"content":{"rendered":"<p>Stronger authentication, better firewalls and use of the latest software are needed to battle an expanding Internet threat environment.  At least that is the view of Microsoft&#8217;s David Aucsmith, architect and CTO, Security Business &#038; Technology Unit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware, spam, phishing, spyware, bots and root kits are raking in big bucks and fighting them effectively is a huge challenge, Aucsmith said in a presentation at the Windows Hardware Engineering Conference in Seattle.  &#8220;We&#8217;ve seen an explosion of criminal enterprise moving onto the Net in the last 18 months or so,&#8221; he said in describing hacker motivation trends.  Among other ills, spam serves as a gateway for artificially generated web traffic, phishing, identity theft and credential theft.  &#8220;People are making a lot of money with spam,&#8221; he said flatly.<\/p>\n<p>Over 60 percent of all Internet users have visited a spoofed site and over 15 percent have been tricked into providing personal data, he said.<\/p>\n<p>They have control channels and can communicate back to whoever created them.  Later they can become keystroke loggers hunting for financial or software license information.<\/p>\n<p>&#8220;There are your moms&#8217; machines, compromised by a bot.  A whole collection of them just look for Windows CD keys.&#8221;<\/p>\n<p>Aucsmith said the &#8220;herders&#8221; who operate bot networks offer to rent out their bot networks.<\/p>\n<p>Aucsmith noted major growth in root kits since the launch earlier this year of Microsoft&#8217;s Anti-Spyware product, which is available as a free download.  But he said rook kits still pose a significant technical challenge, can defeat anti-spyware products and will continue to offer financial incentives to support spyware and adware.<\/p>\n<p>When fighting these threats, a big problem network security pros encounter is legacy systems, Aucsmith said, noting for example that the security kernel for Windows NT was written before there was a World Wide Web and before TCP\/IP was the default communications protocol.  Some Windows NT boxes, nonetheless, remain connected to the Web.<\/p>\n<p>http:\/\/www.techweb.com\/wire\/security\/161601341<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-659","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=659"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/659\/revisions"}],"predecessor-version":[{"id":3146,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/659\/revisions\/3146"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}