Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Security Warning 2008: Top 11 Malware Threats To Watch Out For
Information Week ^ | February 7, 2008 | Thomas Claburn

Posted on 02/09/2008 9:10:03 AM PST by The Spirit Of Allegiance

Security Warning 2008: Top 11 Malware Threats To Watch Out For


Here's a heads-up on the evolving security threats we can expect to see in the coming year, including emerging menaces such as badvertising, adsploits, anti-social networking, lieware, and whaling


By Thomas Claburn
InformationWeek
February 7, 2008 01:18 PM


By the end of 2008, McAfee Avert Labs predicts it will have identified some 550,000 malicious programs, a 54% increase from 2007. With all the new malware emerging, we can expect new terminology to describe these constantly morphing threats. Here, then, is our only slightly tongue-in-check attempt to predict some of the rising threats in 2008 and the language that may be employed to describe those threats.

Badvertising

With 38,500 mentions in Google, "badvertising" already has more of a following than a word like "malcode." The phenomenon it describes, advertising with malice, has been around for several years at least. To date, it has been enough to refer to criminal advertising using terms like "spam," "adware," and "spyware."

The trouble with these terns is that they can be used to refer to legal software or activities. Spam, of course, is permitted under the CAN SPAM Act of 2003. Adware and spyware, meanwhile, can perform their functions legally with user notice and consent (at least until the notice and consent is successfully challenged in court as inadequate).

While "crimeware" is becoming a popular term in lieu of the more fuzzily defined "spyware," "badversting" has an appealing specificity. "Crimeware" after all could refer not just to software but to hardware, like an ice pick. What "badvertising" recognizes is that not all advertising is good.

In 2008, we'll need the word because online advertising will become a major security problem. Indeed it is already: about 80% of malicious code online comes from online ads, according to the Q1 2007 Web Trends Security Report published by Finjan, a computer security company. Watch what happens when AdBlock Plus gets re-branded AdBlock Security.

Adsploit

We may also see "adsploit" emerge to refer to exploits delivered over ad networks. Admittedly, the term has a long way to go, with a mere four mentions in Google, none of which seem particularly coherent. But what better word is there to refer to malware like Trojan.Qhost.WU, which replaces Google AdSense text ads with ads from an unauthorized, potentially malicious provider.

Indexically Transmissible Viruses

Cyber criminals are working overtime to get their sites listed in search indexes. Gaming Google's PageRank algorithm to get one's malware site prominent placement on a search result page has proven to be an effective way to compromise the computers of unwary visitors. Google and the rest are fighting back, as suggests Google's purge of tens of thousands of malware-riddled pages from its index in late November. But the ease and speed with which new sites can be created means that the search companies have a hard time keeping up. Referring to "indexically transmissible viruses" seems like a way to blame search engines more and cyber criminals less, but that's the point: searching needs to be safe. "SEO poisoning" and "spamdexing" are both serviceable terms to describe this phenomenon. But few outside the tech and media industries know that SEO stands for search engine optimization, and spamdexing, after more than a decade of use, remains hobbled by legal tolerance for spamming and near universal desire among Web site owners for the benefits of spamdexing, namely better PageRank. Warning that a search site contains "indexically transmissible viruses" seems likely to elicit more caution from searchers, and more action from search engines, than those two older terms of art.

Snookies

Though the term, with 19,000 entries on Google, is the name of a cookie company, it might well be employed in the tech industry to refer to the misuse of Internet cookies, which are files that Web sites deposit on visitors' computers to identify them and to provide services.

Snookies, which stands for sneaky cookies, or subdomain cookies if you prefer something less pejorative, look like they're coming the Web domain of the site visited, but the subdomain they come from -- subdomain.domain.com, for example -- is set to point to a third-party server. The reason this is done is to avoid being blocked by users who have their Web browsers set to reject cookies from third-party sites.

Anti-Social Networking

A term that parodied the social networking craze could see further straight-faced use as cyber criminals step up efforts to pillage personal information from the likes of Facebook, MySpace, and Orkut. Google squashed the Orkut worm that emerged in December quite quickly but it's a safe bet that schemes to steal social networking data will become more common.

Social Graft

The abuse of one's social graph -- as Facebook calls its friend list -- for material gain. This could be used to describe the use of Facebook's Beacon technology as well as outright efforts at identity theft or related fraud. The term just begs to be used as a variation on the Google Social Graph API; calling it the Social Graft API seems to capture the spirit of exploiting one's friends.

Whaling

When you phish for big fish, you're whaling. Alan Paller at the SANS Institute uses the term to refer to targeting phishing attacks directed at high-profile individuals. While it may be unnecessary, given that spear-phishing adequately communicates that the attack in question was targeted, the exclusivity of the term -- not just anyone can be the victim of whaling -- suggests it may prosper among journalists determined to subtly flatter, or apologize to, VIP subjects featured in security breach stories. Even if the term dies as a result of being unnecessary, the trend of trying to trick high-value targets into giving up the keys to the kingdom is sure to increase.

Lieware

In 2007, there was a lot of "rogue anti-virus software," which is sometimes also referred to as "fake anti-virus software." But these terms are confusing because there's too much negation going on. Fake anti-virus software is not anti-virus software at all. So what is it? "Lieware" is a much less unwieldy term to describe software that purports to be something that it isn't. With only 420 mentions in Google, the term has nowhere near the recognition of "adware" or "spyware." But thanks to the growing need for anti-virus products, we're sure to see more lieware trying to trick its way onto our systems.

Spham or Spamble

Security researchers foresee a rise in spam targeting mobile devices, particularly via SMS. Although the unappealing term "blogging" has given rise to the even more unappealing "moblogging" (blogging on a mobile device), "mospam" just doesn't work. While some have proposed "spamble" as shorthand for gambling spam, the term also has potential to suggest spam received while ambling about with a mobile device. "Spham" offers a more straightforward way to mix spam and phone, though the fact that it sounds the same as "spam" when spoken may limit its appeal. (Yes, you could emphasize the "h" and say "sp-ham," but people would just wonder whether the cause of your odd pronunciation was contagious.)

Backdoored

Everyone in the computer security business is familiar with backdoors and backdoor Trojans. In 2008, "backdoor," heretofore an adjective or noun, has a shot a being promoted, like the word "google," to verb. Here, in a hypothetical conversation with your company's chief security officer is how it might be used: "You were backdoored? Has anyone spoken for your office?" The reason for this is the success of malware like the Zlob backdoor Trojan, which security researchers expect to see much more frequently in the year to come.

Patch Fix

The patch fix is the patch that fixes the last patch. It may seem redundant, like "pizza pie," but given the number of patches that create more problems and subsequently have to be patched, redundancy appears to be necessary to compensate for the absence of code quality.


TOPICS: Crime/Corruption; Miscellaneous; Technical
KEYWORDS: badware; humor; malware; onlineadvertising; spam
Navigation: use the links below to view more comments.
first 1-2021-28 next last

1 posted on 02/09/2008 9:10:15 AM PST by The Spirit Of Allegiance
[ Post Reply | Private Reply | View Replies]

To: The Spirit Of Allegiance

This is all very well and good, but why do I keep getting those emails from strangers telling me how I can enlarge my male private parts? Why can’t Outlook just let me bar all emails from addresses ending in .de? Is that so difficult?


2 posted on 02/09/2008 9:13:47 AM PST by 3AngelaD (They screwed up their own countries so bad they had to leave, and now they're here screwing up ours)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce; HAL9000; backhoe; Lazamataz; Incorrigible; Database; Cindy; John Robinson

Ping


3 posted on 02/09/2008 9:14:05 AM PST by The Spirit Of Allegiance (Public Employees: Honor Your Oaths! Defend the Constitution from Enemies--Foreign and Domestic!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: The Spirit Of Allegiance

Interesting.


4 posted on 02/09/2008 9:15:20 AM PST by BenLurkin
[ Post Reply | Private Reply | To 1 | View Replies]

To: The Spirit Of Allegiance

China !!!


5 posted on 02/09/2008 9:17:55 AM PST by devane617 (I WILL VOTE AGAINST JOHN MCCAIN !!!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 3AngelaD

The problem with your solution is that it still kills bandwidth that we pay for.


6 posted on 02/09/2008 9:19:13 AM PST by devane617 (I WILL VOTE AGAINST JOHN MCCAIN !!!!!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: 3AngelaD
This is all very well and good, but why do I keep getting those emails from strangers telling me how I can enlarge my male private parts?

Many of those emails use images to convey the information rather than text. You can read the text in the image but it would be difficult for an email application to do so. Try switching from html mail to text only email and see what happens. The emails won't go away but you may notice that a large percentage of them have empty bodies once the images have been stripped out.

7 posted on 02/09/2008 9:23:49 AM PST by fso301
[ Post Reply | Private Reply | To 2 | View Replies]

To: The Spirit Of Allegiance

And, worst of all, VISTA!


8 posted on 02/09/2008 9:31:07 AM PST by GingisK
[ Post Reply | Private Reply | To 1 | View Replies]

To: Grizzled Bear; Darksheare; Monkey Face; don-o; Thunder 6

“anti-social networking”

Are they discussing malware threats or some recent vanities? :)


9 posted on 02/09/2008 9:31:13 AM PST by callisto (CONGRESS.SYS corrupted...Re-boot Washington DC (Y/N)?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: devane617

I don’t understand that. Why would my computer barring emails from addresses ending in .de kill anyone’s bandwidth? By the way, is .de Denmark or Germany?


10 posted on 02/09/2008 9:33:36 AM PST by 3AngelaD (They screwed up their own countries so bad they had to leave, and now they're here screwing up ours)
[ Post Reply | Private Reply | To 6 | View Replies]

To: The Spirit Of Allegiance
"backdoor," heretofore an adjective or noun, has a shot a being promoted, like the word "google," to verb.

I've been using that term as a verb for almost a decade now. Used to spend way too much time lurking NASA sites. It's amazing how easy it can be to access root folders when security is not properly administrated.
11 posted on 02/09/2008 9:36:26 AM PST by callisto (CONGRESS.SYS corrupted...Re-boot Washington DC (Y/N)?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

12 posted on 02/09/2008 9:40:30 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 3AngelaD
*** Why can’t Outlook just let me bar all emails from addresses ending in .de? Is that so difficult? ****

You should be able to do that.

I haven't used my Outlook Express for a few years as I now use Mozilla Thunderbird. But you should be able to set up 'Mail Rules' (message filters) for Junk Mail and have them automatically deleted, including from the POP3 mail server. Check your Outlook (Express?) Help Menu on how to do it.

Hope this helps.

13 posted on 02/09/2008 9:43:39 AM PST by Condor51 (Vote McInsane or Ugga-Bugga? Decisions, decisions, decisions.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: callisto

I think we were more along the lines of “Social Graft”!

Regards,


14 posted on 02/09/2008 9:47:29 AM PST by Thunder 6
[ Post Reply | Private Reply | To 9 | View Replies]

To: Thunder 6

LOL...very true


15 posted on 02/09/2008 9:48:26 AM PST by callisto (CONGRESS.SYS corrupted...Re-boot Washington DC (Y/N)?)
[ Post Reply | Private Reply | To 14 | View Replies]

McAfee Avert Labs predicts it will have identified some 550,000 malicious programs, a 54% increase...

What's more amazing is this is tolerated without people saying, "there has to be a better way."

16 posted on 02/09/2008 9:48:52 AM PST by D-fendr (Deus non alligatur sacramentis sed nos alligamur.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 3AngelaD

What will help kill a huge portion of that is programs like SpamAssassin and others that use both spam detection and blacklists to stop spam at the server before it even gets to you. Talk to your ISP about using such programs if it doesn’t already. Then you can use mail programs like Thunderbird that have learning spam filters (mark it as spam and it remembers) to catch most of those that slip through.

I have an account that was getting several hundred spams a day until I did both of these, and now I only see a few.


17 posted on 02/09/2008 9:52:04 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 2 | View Replies]

To: 3AngelaD
This is all very well and good, but why do I keep getting those emails from strangers telling me how I can enlarge my male private parts?

I get the same thing.

But I wonder - how do they know?

18 posted on 02/09/2008 9:58:27 AM PST by Fido969 ("The hardest thing in the world to understand is income tax." - Albert Einstein)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Condor51

I did all that and followed the directions and ended up getting no email at all, because the rule maker could not read .de, it just reads the dot {.} I had to go back and remove the rule, and when I did, Outlook Express downloaded 280 emails that I had previously deleted!! I know there should be a way to do this, but neither help nor anything else has been able to tell me how.


19 posted on 02/09/2008 10:04:13 AM PST by 3AngelaD (They screwed up their own countries so bad they had to leave, and now they're here screwing up ours)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Fido969

What I want to know is, WHY don’t they know. My email address makes it pretty clear that I do not have male private parts, let alone those that need enlarging. Makes you wonder about Europeans.


20 posted on 02/09/2008 10:06:17 AM PST by 3AngelaD (They screwed up their own countries so bad they had to leave, and now they're here screwing up ours)
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-28 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson