June 20, 2005
Hackers Score Big by Thinking Small
WASHINGTON -- A recent computer security breach that left 40 million credit cards vulnerable to fraud shows how online criminals are scoring big by thinking small, experts said on Monday.
Cybercriminals are increasingly crafting more focused attacks with a potential for profit as they target one or two companies at a time, rather than blasting out Internet virus attacks across the globe, according to security experts.
In Israel, police are investigating a massive case of industrial espionage that used a "Trojan horse" computer program to copy confidential information from some of the country's top businesses.
Security vendors say such attacks are increasingly common.
"We have seen several examples of targeted, manually crafted Trojans that people write and implement for a very small number of companies," said Aladdin Security Vice President Shimon Gruper.
MessageLabs chief technical officer Mark Sunner said that since January the company has seen a 150 percent increase in attacks that only target one or two companies.
Experts said there are a number of reasons behind the shift. Playful hackers looking for kicks could write viruses that plagued companies and computers around the world but brought them no financial return. They have been elbowed aside by organized criminals, often based in Eastern Europe, who are motivated by profit and willing to launch a sustained, sophisticated assault.
Targeted attacks have another key advantage: they are usually small enough to stay off the radar of Internet security firms that are looking for broader attacks. That gives the high-tech criminals the time to research a company thoroughly before trying to penetrate it.
"You know there's specific technology, a piece of intellectual property, how much money is in their accounts," said RSA Security Inc. CEO Art Coviello. "That's the advantage -- you have a little bit more knowledge."
Attackers can then send individual, personalized e-mails to the target company's employees, or pose as an IT administrator who needs to install a software update. Once in, they can use simple spyware programs to pick up passwords, account numbers and other valuable information.
"When you see a focused attack like this, this is kind of your worst-case scenario. These are people who are going to actually do something with those credit cards once they get them," said Mike Gibbons, a Unisys Corp. vice president and former FBI cybercrime chief.
E-mail viruses have lost their teeth now that more people are using antivirus software properly, said Alfred Huger, senior director of engineering at the antivirus provider Symantec Corp.
While old viruses continue to circulate, "they're background noise," he said.
At the same time, Microsoft Corp. has patched the most gaping holes in its Windows operating system and companies have learned to install those patches quickly, said John Pescatore, a vice president at the consulting firm Gartner Inc.
Identity thieves who used to go through trash bins to find credit-card receipts have learned that it's more worthwhile to extract such information from companies that collect it.
"Two years ago I would say one of the things you should do is shred your trash. Now that is completely obsolete advice," said Bruce Schneier, chief technical officer for Counterpane Internet Security Inc.