Langsung ke konten utama

Malicious Software Infects Corporate Computers

A malicious software program has infected the computers of more than 2,500 corporations around the world, according to NetWitness, a computer network security firm.

The malicious program, or Botnet, can commandeer the operating systems of both residential and corporate computing systems via the Internet. Such botnets are used by computer criminals for a range of illicit activities, including sending e-mail spam, and stealing digital documents and passwords from infected computers. In many cases they install so-called “keystroke loggers” to capture personal information.

The current infection is modest compared to some of the largest known botnets. For example, a system known as Conficker, created in late 2008, infected as many as 15 million computers at its peak and continues to contaminate more than 7 million systems globally. Currently Shadowserver, an organization that tracks botnet activity, is monitoring 5,900 separate botnets.

NetWitness said in a release that it had discovered the program last month while the company was installing monitoring systems. The company dubbed it the “Kneber botnet” based on a username that linked the infected systems. The purpose appears to be to gather login credentials to online financial systems, social networking sites and e-mail systems, and then transmit that information to the system’s controllers, the company said.

The company’s investigation determined that the botnet has been able to compromise both commercial and government systems, including 68,000 corporate log-in credentials. It has also gained access to e-mail systems, online banking accounts, Facebook, Yahoo, Hotmail and other social network credentials, along with more than 2,000 digital security certificates and a significant cache of personal identity information.

“These large-scale compromises of enterprise networks have reached epidemic levels,” said Amit Yoran, chief executive of NetWitness and former director of the National Cyber Security Division of the Department of Homeland Security. “Cyber criminal elements, like the Kneber crew, quietly and diligently target and compromise thousands of government and commercial organizations across the globe.”

The company, which is based in Herndon, Va., noted that the new botnet makes sophisticated use of a well-known Trojan Horse - a backdoor entryway to attack - that the computer security community has previously identified as ZeuS.

“Many security analysts tend to classify ZeuS solely as a Trojan that steals banking information,” stated Alex Cox, the principal analyst at NetWitness responsible for uncovering the Kneber-bot. “But that viewpoint is naïve. When we began to detect the correlation among both the methodology used by the Kneber crew to attack victim machines and the wide variety of data sets harvested, it became clear that security teams must rethink their entire perspective on advanced threats such as ZeuS.”

Half of the machines infected with the Kneber botnet were also infected by an earlier botnet known as Waledec, the company noted.

The existence of the botnet was first reported by the Wall Street Journal, shortly before the company issued its press release.

sumber : http://www.nytimes.com/2010/02/19/technology/19cyber.html?src=linkedin

Postingan populer dari blog ini

57% Use Social Network Sites

The power of online social networking was demonstrated by the tens of thousands who gathered in Shanghai at the weekend to pay their respects to the people who died in last Monday's blaze. The event at Jiaozhou Road was launched on microblogs and information spread rapidly on the Internet , especially on social networking sites such as Kaixin001.com. According to a survey by Shanghai Daily and Touchmedia, of 110,000 people traveling in taxis in Shanghai, Beijing, Guangzhou and Shenzhen , 57 percent of interviewees use social networking sites or microblogs for more than half an hour a day, and 18 percent for more than three hours. Microblogging is the most popular form. Almost 60 percent of the interviewees said they publish information on microblogs, communicating with friends, following celebrities, expressing their opinions, sharing jokes and conducting online marketing, said the survey.

Kerajaan Jeumpa, Kerajaan Islam Pertama Nusantara

Teori tentang kerajaan Islam pertama di Nusantara sampai saat ini masih banyak diperdebatkan oleh para peneliti, baik cendekiawan Muslim maupun non Muslim. Umumnya perbedaan pendapat tentang teori ini didasarkan pada teori awal mula masuknya Islam ke Nusantara. Mengenai teori Islamisasi di Nusantara, para ahli sejarah terbagi menjadi 3 kelompok besar, yaitu pendukung (i) Teori Gujarat (ii) Teori Parsia dan (iii) Teori Mekah (Arab). Bukan maksud tulisan ini untuk membahas teori-teori tersebut secara mendetil, namun dari penelitian yang penulis lakukan, maka dapat disimpulkan bahwa Teori Mekkah (Arab) lebih mendekati kebenaran dengan fakta-fakta yang dikemukakan. Teori Mekkah (Arab) hakikatnya adalah koreksi terhadap teori Gujarat dan bantahan terhadap teori Persia. Di antara para ahli yang menganut teori ini adalah T.W. Arnold, Crawfurd, Keijzer, Niemann, De Holander, SMN. Al-Attas, A. Hasymi, dan Hamka. i Arnold menyatakan para pedagang Arab menyebarkan Islam ketika mereka mendo...

Upcoming Facebook Redesign Surface