Digital MIT Technology Review

Cyber Attacks

Author

Mikko Hypponen

July 10, 2014

What are the biggest threats?

In the real world, you only have to worry about the criminals who live in your city. But in the online world, you have to worry about criminals located anywhere on the planet. Many hotbeds of online criminal activity are located in cities whose police forces are already overextended fighting “real-world” crimes and who lack the resources and expertise to investigate online activity. And in the past decade, the criminals themselves have changed. In 2003, all the malware was still being written for fun by hobbyists, but now it is being produced by professional criminals, hacktivists, and governments who can invest big money to craft attacks that deliver massive payoffs.

What are the biggest threats?

Bitcoins

Bitcoins only have value when the transactions are confirmed by at least six members of the peer-to-peer network. Users who participate in transaction confirmations are rewarded with Bitcoins, a process that is called mining. As the value of a Bitcoin has increased, mining has become harder, because more people want to do it. Today, to make real money at mining Bitcoins, you need powerful computers — but those computers don’t necessarily have to be yours. Some of the largest botnets run by online criminals today are monetized by mining. So an infected home computer of a grandmother in Barcelona, for example, may be mining Bitcoins worth tens of thousands of dollars a day for a Russian cybercrime gang.

Cyber spies

Companies and governments spend money on espionage. Cyber spies use trojans and backdoors to access data on their targets’ computer networks, remotely monitor them, and perform actions on them, such as keylogging to collect passwords or eavesdropping through the infected computer’s microphone.

The most effective method to protect data against cyber spying is to process confidential information on dedicated computers that are not connected to the Internet. Critical infrastructure should be isolated from public networks.

 Exploits

Cyber attacks rely on exploitation of “vulnerabilities” — bugs in the source code of commonly used software — to infect target computers. When professional criminals and governments got into the cyber attack game, demand for new “exploits” greatly increased, and boutique companies sprang up to find and sell these exploitable bugs. Some U.S.-based defense contractors are openly advertising positions for people with Top Secret/SCI clearance to create offensive exploits targeting iPhones, iPads, and Android devices. As the U.S. has engaged in offensive cyber attacks on other countries, other countries have followed suit, creating a cyber arms race that will continue to increase demand for exploits.

Government  surveillance

The two most important inventions of our generation, the Internet and the mobile phone, changed the world — but they also have turned out to be perfect tools for the surveillance state. And in a surveillance state, everybody is assumed guilty. PRISM, one of the governmental surveillance programs unveiled by Edward Snowden, monitors people known to be innocent and builds dossiers on everyone based on their Internet activity. Because the U.S. is home to the most ubiquitous Internet services, search engines, webmail sites, browsers, and mobile operating systems, it can basically spy on the whole world at a level no other country can.

However, the same advancements in computing power and data storage that have made wholesale surveillance possible have also made leaking possible. Leaking has become so easy that that it will keep organizations worrying about getting caught in any wrongdoing, and maybe even force them to avoid unethical practices. The governments that watch over us know that we are also watching over them.

Read the full article here.

Mikko Hypponen Chief Research Officer of F-Secure looks at cybercrime and cyber attacks launched by nation states. He sees that in the last decade there has been a shift in the perpetrators of this type of activity, hobbyists have been replaced by new attackers: criminals, hacktivists and governments.

 

View “Cyber Attacks” and find more technology news from MIT Technology Review.

© 2014 MIT Technology Review

Great ! Thanks for your subscription !

You will soon receive the first Content Loop Newsletter