iTnews

From Black Hat: Webroot CTO: Spyware threats on the increase

By Ericka Chickowski on Aug 3, 2006 2:48PM

Experts convened at BlackHat on Wednesday reported that the spyware threat continues to increase and it will remain unbeatable while jurisdictional issues between government enforcement bodies persist.

Meeting today at the Center for Democracy and Technology Anti-Spyware Coalition Public Forum on Corporate Spyware Threats, experts came together to discuss the state of spyware in today's environment.

According to Gerhard Eschelbeck, chief technical officer at Webroot, his research team identified more than 100,000 new potentially malicious sites in the last fiscal quarter. While the distribution of adware has decreased, the rates of trojans and other more malicious spyware programs has increased.

Eschelbeck said that spyware distributors are increasingly targeting users with keyloggers and other programs to mine personal identifiable information on the black market while upping the ante with better techniques for distribution and covering their tracks.

"Right now it is all about improving the distribution and obfuscation," he said.

He said that increasingly spyware is undetectable as developers continue to make more use of rootkit technology to place programs under the operating system layer.

In addition to the technical difficulties of nabbing spyware distributors, panelists also outlined the problem with punishing them once found.

"This problem lies at the legal-technology boundary," said Dan Kaminsky of Dox Para Research, who was one of several speakers today at the.

Kaminsky gave an example to the audience of a friend's mother whose computer was rendered inoperable by all of the spyware on the machine. She told him that it had been sitting in a closet for six months before he worked on it because she was unable to fix the problems.

"That was just one machine in one closet, but I started to think to myself, ‘How many other millions of computers are in a closet somewhere?'" he said.

"These spyware programs are causing millions of dollars in damage and no one is going to jail."

Eileen Harrington of the the Federal Trade Commission (FTC) said that while the government has been coming down hard on adware purveyors for their practices, her organization does not have the authority to arrest the criminal element in the world of spyware. Even the Department of Justice, which does have those powers, doesn't necessarily have jurisdiction as many related issues are under local jurisdiction. This often leads to cases being ignored, as local enforcement agencies just don't have the resources to go after spyware crimes.

"I think you nailed it on the head," she said to Kaminsky, "this definitely lies at that legal-technical boundary and the people who do it know it. The question for Congress is whether we want to change the laws to address this."

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
blackctofromhatincreaseonsecurityspywarethethreatswebroot

Partner Content

DoT Victoria turns to Oracle to implement unified cloud-based platform
Promoted Content DoT Victoria turns to Oracle to implement unified cloud-based platform
How a 'micro data centre' enables your business, your way
Promoted Content How a 'micro data centre' enables your business, your way
Security through visibility: supporting Essential Eight cyber mitigation strategies
Promoted Content Security through visibility: supporting Essential Eight cyber mitigation strategies
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Ericka Chickowski
Aug 3 2006
2:48PM
0 Comments

Related Articles

  • Senior EU officials were targeted with Israeli spyware
  • Israel ramps up police scrutiny as spyware scandal spreads
  • FBI tested NSO Group's spyware
  • Israeli police under fire over reported use of Pegasus to hack Israelis
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

Westpac promotes its head of technology to mortgage role

Westpac promotes its head of technology to mortgage role

Digital Nation

COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.