[PRNewswire] While the term "data-stealing malware" is a relatively new one, its sole purpose for existence is a familiar story: To steal proprietary information such as online banking credentials, credit card numbers, social security numbers, passwords, and more from compromised networks and PCs in order to fuel an underground cyber crime economy driven by profit-seeking criminal networks that cross geopolitical boundaries.
Trojans: The Rising Star in Data-Stealing
Trojans are the fastest growing category of data-stealing malware, according to data from TrendLabs(SM), Trend Micro's global network of research, service, and support centers committed to constant threat surveillance and attack prevention. Trojan attacks pose a serious threat to computer security. True to their name, they typically arrive disguised as something benign such as a screen saver, game, or joke. Based on TrendLabs research:
In 2007, 52 percent of data-stealing malware were Trojans; in 2008, that number increased to 87 percent; as of Q1 2009, 93 percent of data-stealing malware were Trojans.
Trojans and Trojan spyware are the predominant type of data-stealing malware in all regions monitored by TrendLabs, including Australia, Asia, Africa, South America, North America and Europe.
"As a threat category, data-stealing malware is experiencing tremendous growth because it serves the needs of financially motivated criminals who leverage the Internet for what it does best - provides valuable information," said Jamz Yaneza, threat research manager for Trend Micro.
The Politics of Transnational Cyber Crime
Politics and cyber crime have finally intersected in news headlines; understandably so: In the U.S. alone, the number of known breaches of government computers with malware more than doubled between 2006 and 2008, according to the Department of Homeland Security.
And, says Trend Micro advanced threat researcher Paul Ferguson, it is even possible that cyber terrorists may have already planted malware within the U.S. electrical grid that would allow them to remotely disrupt service.
Cyber crime has gained significant international mobility. In 2007, Estonian computer networks were crippled when serious distributed denial of service (DDoS) attacks against government and civilian sites were reputedly linked back to Russian operatives. At the time, Russia and Estonia were involved in a dispute over the Estonians' removal of a Soviet war memorial. The French Embassy's web site in Beijing was inaccessible for several days after a full-scale cyber attack following President Nicolas Sarkozy's meeting with Tibetan spiritual leader, the Dalai Lama. Experts now widely believe instead that a Chinese hacking group staged the attack for nationalistic purposes.
"Virtually anyone with a computer and Internet access can wreak havoc. In the U.S., hacker attacks have been documented on county or state government sites," said Ferguson. "Smaller organizations have a limited IT budget and few IT staff so they hire a third party to build a web site. Over time, the site fails to be maintained or upgraded, exposing vulnerabilities that hacktivists then leverage to express political views."
Cyber espionage is also grabbing headlines. Every year, corporations suffer billions of dollars in intellectual property losses when trade secrets are illegally copied and sold to competitors on the black market for profit, or used for extortion. Business networks all over the world provide the perfect medium for cybercriminals capable of breaching their defenses.
"Cybercriminals are using malware for financial gain and for geopolitical purposes," said Ferguson. "We have even seen data-stealing malware attacks against U.S. defense contractors - believed to be Chinese - launched to steal confidential trade secrets. However, it's hard to connect the dots back to the people really pulling the strings because of the anonymous nature of the Internet."
Traditional Security is no Longer a Match for Cyber Criminals
For years, security protections have been focused on protecting the endpoints - where most people access data. In today's multi-threat environment, a new strategy is needed. The Trend Micro(TM) Smart Protection Network enables a multilayered threat prevention approach that is built upon the concept of proactively blocking data-stealing malware in the Internet cloud before they can infiltrate a network.
A correlated approach is used to address the tendency for cybercriminals today to launch multi-pronged, combined attacks composed of a number of different Web threats. Using correlation technology and behavioral analysis, the Smart Protection Network correlates combinations of threat activities to evaluate their potential for danger. It analyzes email, embedded links, file attachments, and hosted web files to identify new IPs, domains, URLs, and files that can be instantly added to reputation databases to quickly block new threats.
By examining the relationships between and across different components, the Smart Protection Network provides a realistic view of potential threats to deliver a holistic, comprehensive view of the threat landscape.
Data Protection Pack for "Insider" Threats
A company's greatest asset - their employees - can also be their greatest security liability, especially by those who have access to data within a corporate network. Trend Micro offers solutions not just for external threats, but internal threats as well. The Data Protection Pack bundles together Trend Micro(TM) LeakProof Standard, Trend Micro(TM) Email Encryption Gateway and Trend Micro(TM) Message Archiver. The Data Protection Pack secures email and prevents the loss of sensitive data in use, in motion and at rest; it is available for Trend Micro(TM) NeatSuite Advanced and Client Server Messaging customers.
Rise in Cyber Crime, Cyber Terrorism and Cyber Espionage Tied Heavily to Data-Stealing Malware
see also Data-Stealing Malware Focus Report