Cybercriminals shifting focus to non-Windows systems
In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, tablet computers, and mobile platforms in general, according to the Cisco 2010 Annual Security Report.
The report also finds that 2010 was the first year in the history of the Internet that spam volume decreased, that cybercriminals are investing heavily in “money muling,” and that users continue to fall prey to myriad forms of trust exploitation.
In response to the last decade of cyber-exploits targeting PC operating systems, PC platform and application vendors have shored up security in their products and taken a more aggressive approach to patching vulnerabilities. As a result, scammers are finding it harder to exploit platforms that were once their bread and butter — in particular, the Windows platform — and are looking elsewhere to make money. Just as important in driving this trend is the widespread adoption of mobile devices and applications. Third-party mobile applications in particular are emerging as a serious threat vector.
The Cisco Annual Security Report also includes winners of the 2010 Cisco Cybercrime Showcase and discusses the impacts of social media, cloud computing, spam and global cybercrime activities on network security.
2010 marks the first year of declining spam volume in the history of the Internet. Despite this good news, 2010 saw an uptick in spam in developed economies where broadband connections are spreading, including France, Germany and the United Kingdom. In the United Kingdom, for example, spam volume rose almost 99 percent from 2009 to 2010. The good news is that Brazil, China and Turkey — all of which figured high on last year’s list of spammed nations — showed significantly lower volumes in 2010. In particular, Turkey’s spam volume dropped 87 percent. This reduction is due in part to the high-profile takedowns of botnets like Waledac and Pushdo/Cutwail, attributed largely to researcher Thorsten Holz (see the Cisco Cybercrime Showcase) and ISPs restricting malicious e-mail from broadband networks. In addition, authorities are taking the spam problem more seriously and are looking to take down egregious offenders.
As the cybercriminal economy expands and criminals gain access to even more financial credentials, there is a growing need for money mules — people recruited to set up bank accounts, or even use their own bank accounts, to help scammers “cash out” or launder money. Money muling operations are becoming more elaborate and international in scope, and Cisco security experts anticipate they will be a major focus of cybercriminal investment in 2011.
Most cybercrime exploits hinge not only on technology but also on the all-too-human tendency to misplace trust. The Cisco Annual Security Report lists seven “deadly weaknesses” that cybercriminals exploit through social engineering scams — whether in the form of e-mails, social networking chats or phone calls. The seven weaknesses are sex appeal, greed, vanity, trust, sloth, compassion and urgency.
Cisco Global ARMS race index
Cisco’s Global Adversary Resource Market Share (ARMS) Race Index was designed to track the overall level of compromised resources worldwide and, over time, to provide a better picture of the online criminal community’s rate of success at compromising enterprise and individual users. According to data collected for the 10-point index, the level of resources under adversarial control worldwide at the end of 2010 was down almost a half a point from the December 2009 level of 7.2 reported in the Cisco 2009 Annual Security Report.
The 2010 Cisco cybercrime showcase
The second annual Cisco Cybercrime Showcase presents two awards for 2010 — one acknowledging the outstanding contributions of a security professional in the fight against cybercrime (the “Good,” Thorsten Holz, Ruhr-University Bochum, Germany/LastLine), the other the most threatening malware (the “Evil,” Stuxnet).
Cisco Cybercrime Return on Investment (CROI) matrix
The Cisco CROI Matrix, which made its debut in the Cisco 2009 Annual Security Report, analyzes types of cybercrime that Cisco’s security experts predict profit-oriented scammers will channel their resources toward in 2011. Based on performance in 2010, the matrix predicts that the data-theft Trojans such as Zeus, easy-to-deploy Web exploits, and money mules will continue to rise in prevalence in 2011.
The “wait and see” moneymakers include mobile malware, with Zeus already being adapted for the mobile platform in the form of SymbOS/Zitmo.Altr (“Zitmo” stands for “Zeus in the Mobile”). Social networking scams, on the other hand, will not be a significant area for cybercriminals to invest resources in 2011, despite ranking in last year’s report in the Potentials category. That does not mean that social networking scams are declining; they are simply a small part of a bigger plan — launching Web exploits like the Zeus Trojan.
The complete report is available here.