Malware


TED Global: Misha Glenny Says ‘Hire The Hackers’

The TED talks have long been famous for introducing a wide (albeit wired) audience to The Next Big Thing, whether it was Jeff Hann at NYU demonstrating the Minority Report-style touch-sensitive user interfaces in 2006 – years before the iPhone hit the market – or MIT’s David Merrill’s demonstration of stackable mini computers called Siftables. (OK – we’re not sure yet what the heck you can use those for.)

Ice IX: Not Cool At All

By Dmitry TarakanovMy colleague Jorge Mieres recently found a C&C server of a botnet based on a malicious program called Ice IX. As announced on several user forums, Ice IX is a bot created using the source code of ZeuS 2.0.8.9, which became publicly available in May. The author of the new bot says the program includes substantial enhancements, which should be interesting to those cybercriminals who steal money from users with the help of banking Trojans.


Researchers at security firm Trusteer claim a new version of the SpyEye Trojan horse program that targets mobile banking users with Android mobile phones and intercepts SMS text messages to and from the phone. However, significant obstacles may prevent it from spreading.

By Chris WysopalIn the days following 9/11 we heard alarmist warnings of a coming wave of cyberterrorism. In the early days of the war in Afghanistan when an Al Qaeda computer was found, it was treated as evidence that terrorists knew how to use computers so therefore they would soon be sending worms to shut down or blow up our power plants. During that time I was interviewed on a CNN talk show describing what a terrorist might be doing with a computer that was found to have computer aided design (CAD) software on it.  I said it might be used to figure out the best place to plant a bomb to cause the most damage to a structure.  This wasn’t cyberterrorism. It was using the computer as an engineering tool.  Somehow this got lost by the host of the show who kept on plugging away that cyberterror from Al Qaeda was coming soon.  That never materialized and in the last 10 years I don’t think there has been any documented cases of cyberterrorism.

It was December 8, 2000 – the waning days of the Clinton Administration. Richard Clarke, a member of President Clinton’s National Security Council, was addressing attendees at SafeNet 2000, a conference sponsored by Microsoft Corp. that brought together computer security experts from around the country to talk about ways to increase cooperation around cyber security.