Your Peace of Mind is our Commitment

Contact Us English Recent Articles

The F-Secure Data Security summary January - June 2007

First published: 30th June 2007

Security threats cross technology borders towards a new malicious economy; social engineering, bank scams, Cyber War and clever mobile intruders.

The F-Secure Lab saw a steady flow of reports on a vast variety of data security threats during the first half of 2007. The underlying trend to note is the spread of malicious activity across various forms of technology and applications during the 6-month period. It would appear that the parties behind orchestrating security attacks are conquering more and more foothold to build a stronger, sustainable commercial economy based on carefully crafted security attacks targeting consumers, companies and public sector organizations.

Social engineering developed to a new level of sophistication via the Small.DAM Trojan, causing havoc via e-mail in January, 2007. Masking itself under the pretense of shocking headline news, linked to real-life events such as the January storms in Europe, the Storm-Worm spread at an alarming speed across the globe in just one night. The F-Secure tracking System was illuminated across the continents as the Trojan took its course.

The banking industry continued to be a key target for phishing scams. As Trojans become more technically complex, scammers implemented new techniques in their attacks, including content filters that keep closer track of consumers' online banking activity. Such detection methods make it easier and more effective for fraudsters to collect more account details using a variety of methods. However, an industry discussion is gathering pace around a potential solution to banking scams. F-Secure believes that top-level domains inaccessible to scammers, such as .bank, could put a stop to some of the most alarming phishing activity.

The link between cybercrime and real-life political unrest was tightened as a form of "Cyber War" emerged as political rioting caused general unrest in the Estonian capital, Tallinn. Disputes over the re-location of a Russian Red Army monument not only led to arrests over ground, but several governmental and other public sector and media websites were heavily targeted via Distributed Denial of Service (DDoS) attacks by an extremely active network of hackers. Several key sites were rendered unreachable.

Adding to the construction of a stronger malicious economy of sophisticated security breaches, the mobile malware industry became more active during the last 6 months. "Personalised" SMS spam, financial lotteries, and Viver trojans masking themselves as utility programs are some of the examples of the fast-developing mobile scams. New spyware was also reported for some Windows Mobile and Symbian S60 3rd Edition devices.

It is fairly alarming to see increasingly complex mobile trojans and spyware being developed by growing commercial entities, making solid profits to support further development of the malicious economy.


More Information