The development of cybercrime – part three.

Development of cybercrime – part three

The second half of the 2000s was a period of far-reaching changes in the development of cybercrime. On the global stage, the place of the previously popular worms began to be taken by tools created by organized hacking groups that were focused on profit and infecting as many devices as possible. It was also a time of growth for malicious tools hitting critical and industrial infrastructure.

Fortinet specialists present the third part of the study on the history of cybercrime development.

2005: Mytob/Zotob – worm, backdoor and botnet all in one

Before the advent of Mytob, the authors of malware were mostly enthusiasts who created them out of a desire to make a joke or out of sheer curiosity. However, the emergence of the Mytob/Zotob variants changed the world.

Mytob combined the functions of a worm, a backdoor, and a botnet. Infected devices in two ways. In the first, it used contacts from the victim’s address book for automatic distribution – spread in malicious email attachments. In the second, it used protocol vulnerabilities that allowed it to scan the network for vulnerable devices and then replicate to them.

Mytob was also one of the first types of malware that blocked anti-virus software or even worked against it, preventing the victim’s computer from connecting to sites containing updates. It was very effective for its time and had many variants with different functionality. It was constantly at the top of lists of the biggest threats.

The Mytob/Zotob variants caused massive disruption to 100s of companies, including the New York Times newspaper and CNN television station.

The dawn of the era of spyware and search interception

2005: CoolWebSearch and BayRob

CoolWebSearch, commonly known as CWS, was the first tool that allowed cybercriminals to intercept search results from Google and overlay them with “results” from the hackers themselves. CWS was most often spread by downloaded applications or adware. It was so widespread and difficult to remove that volunteers developed programs (such as. CWS Shredder) and managed online forums to help remove it for free.

A similar attack appeared a few years later, in 2007. It resulted in criminals intercepting search results from eBay. It was discovered when a woman in Ohio bought a car for several thousand dollars that never arrived. Authorities determined that the vehicle was not actually for sale, and that the would-be buyer’s computer contained BayRob malware that “injected” fake offers onto her device. The FBI and Symantec waited patiently for years for the cybercriminals to make a mistake, culminating in their arrest in 2016.

Spyware, spy vs. spy and the discovery of cyberweapons used by states

2010: Stuxnet

Beginning of 2010. is when malware used to attack Industrial Control Services (ICS) devices, specifically Control and Data Acquisition (SCADA) devices, was discovered. Stuxnet turned out to be the first malware to target critical infrastructure. In this case, it was industrial centrifuges (especially nuclear centrifuges), where Stuxnet caused them to rotate excessively and lead to a meltdown. It primarily attacked companies in Iran, but soon spread to SCADA systems around the world. Analysis of its code showed that it is not specific to devices used in Iran and can be adapted to any company that uses ICS solutions. An article published in 2012 in the NY Times confirmed that Stuxnet was developed by the United States and Israel.

2011: Regin

Regin was a modular Remote Access Trojan (RAT) that could easily adapt to its target environment. Documents that were exfiltrated were often stored in an encrypted container. Because it was in a single file, it did not raise suspicion among system administrators or anti-virus software. According to Der Spiegel, Regin was a creation of the U.S. NSA and was designed to spy on European Union citizens. This was revealed in the leak of information provided by Edward Snowden.

2012: Flame

At the time of its discovery, Flame was considered the most advanced malware ever found. It had everything: the ability to spread through a LAN, the ability to record and capture screenshots and audio, eavesdrop and record conversations. Flame’s targets were primarily organizations in the Middle East.

Related Posts

Submit your project to the Mobile Trends Awards and compete for the most important award on the mobile market!

Submit your project to the Mobile Trends Awards and compete for the most important award on the mobile market! In Krakow, March 17-18, 2022 the largest conference…

In 2021, by almost 10 percent. salaries in IT increased! No Fluff Jobs report.

2021 by almost 10 percent. salaries in IT increased! – No Fluff Jobs report No Fluff Jobs – the only portal with IT ads available in 6…

User Experience – destructive influence of innovation on humanity and social responsibility of a designer.

User Experience – disruptive influence of innovation on humanity and social responsibility of a designer Humanity strives to simplify – our brain is lazy and often flattens…

Wind fiber in Antarctica Coming Soon!

Fiber optic cable in Antarctica? – Coming soon! The island has long been an object of fascination for scholars and travelers of all kinds. It was previously…

The decline of journalism What the future holds for media workers in 2022

The decline of journalism? – What the future holds for media workers in 2022? Journalism is experiencing a bit of an existential crisis. It is forced to…

The three most important elements of cyber hygiene in the age of hybrid work.

The three most important elements of cyber hygiene in the age of hybrid work Network users often expose themselves to attacks of cybercriminals, e.g. by using the…