{"id":755,"date":"2006-04-18T00:00:00","date_gmt":"2006-04-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/18\/whats-the-next-security-threat\/"},"modified":"2021-12-30T11:38:06","modified_gmt":"2021-12-30T11:38:06","slug":"whats-the-next-security-threat","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/18\/whats-the-next-security-threat\/","title":{"rendered":"What&#8217;s the next security threat?"},"content":{"rendered":"<p>In January this year, 20-year-old Jeanson James Ancheta pleaded guilty in a California court to charges that he had broken into government computers and taken control of them for purposes of fraud.  He had planted Trojan software on the systems at the China Lake Naval Facility in California&#8217;s Mojave Desert, enabling him to manipulate computers on the network there.  He had then used the computers to generate hits on Web site advertisements, for which the advertisers paid according to the traffic they received.  The spyware or Trojan horses they plant on unsuspecting users&#8217; machines do not draw attention to themselves, but once installed, they work as slaves to their remote masters.  Bot networks, which are armies of these hijacked computers, have become the predominant feature of the Internet threat landscape.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The botnets are used by their owners to defraud Internet advertisers, as in Ancheta&#8217;s case, or they can be rented out by the hour to those who want to carry out cheap mass-mailing campaigns.  Extortionists may also rent them to launch denial-of-service attacks on legitimate Web sites.<\/p>\n<p>&#8220;We are seeing less of the big virus outbreaks such as Sasser and Blaster, and so some people believe the situation is getting better, when in fact it is getting worse,&#8221; said Mikko Hypponen, chief research officer at security company F-Secure.  He sees botnets as a major problem that cannot be easily fixed, because the hijacked machines are mostly home PCs connected to an ADSL line.<\/p>\n<p>&#8220;Once active, it monitors every Internet connection, every access to Web pages and access to the bank, and reports it back to the creator of the Trojan,&#8221; Sancho said.<\/p>\n<p>While Windows PCs remain the prime target for attacks, prepare to see more activity targeted at the mobile phone.  F-Secure recently detected the first malicious Java software on a cell phone, meaning it could affect most handsets, and not just the high-end models, Hypponen said.  And in March, he spotted a Trojan horse that plants itself on the cell phone and calls a premium rate number in Russia, each time clocking up five euros ($6.04) for the criminal who sent it.<\/p>\n<p>Even so, the rapidly growing world population of broadband users means that botnets will continue to be the main focus for Internet criminals.<\/p>\n<p>All of the people in the Rogues Gallery of the world&#8217;s top 10 spammers, on the Spamhaus Project Web site, are constantly topping up their networks with new zombie machines owned by people with little concept of security.<\/p>\n<p>http:\/\/news.com.com\/Whats+the+next+security+threat\/2100-7349_3-6061341.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-755","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=755"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/755\/revisions"}],"predecessor-version":[{"id":3242,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/755\/revisions\/3242"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}