World Wide Worm
The slowdown is fuelling the explosive growth of malware or malicious software and both India Inc. and Indian consumers are in the firing line.

- In September 2007, Russian hackers wormed their way into Bank of India’s website and converted it into a minefield of nearly two dozen different malicious software tools that took over the computers of unsuspecting browsers. This brazen attack also brought the bank’s website down.
- Earlier this year, hackers waded into the networks of several embassies globally, including the Indian embassy in the US, and an electronic spying ring, housed in China, stole confidential data from these networks.
- Most recently, online conmen duplicated Reserve Bank of India’s website and enticed gullible people into transferring Rs 10 lakh online into their accounts.
But India is hardly the only target of hackers. Across the world, hackers are raising their activities to a fever pitch, using an assortment of tools ranging from worms and viruses to phishing attacks and botnets—a network of computers that spew out malicious code on unsuspecting enterprises and consumers.

David Dewalt
Hackers often use a flood of spam e-mail to wind their ways onto computers and the slowdown— messages with baits of economic stimulus grants or jobs with $100,000 salaries—is only egging them on. “E-mail users should be aware of this type of deception… spammers collect personal information that may be used to infect machines with malicious content,” says Shantanu Ghosh, Vice President, India Product Operations, Symantec. Spammers have even used the rejection letter sent to job hunters to spread their wares. Letters or e-mails sending perceived rejection letters are often opened by unsuspecting users, resulting in systems being attacked.
DeWalt ascribes three reasons for this growth: complexity of IT systems, which prevents the implementation of one single security policy; the of availability tool kits to build malicious code online; and the triple play of growing number of threats, device proliferation and uneven compliance. “Hacking techniques are available for $50 online and you can Google rudimentary virus-building kits and with a little help you can release it in as little as 30 minutes,” says DeWalt.
Simultaneously, a thriving and growing underground economy for these malicious software tools—with credit card details, including the critical CVV2 number for $0.50—has only spurred the growth of this market. “Creating malware today no longer has the same financial aim as previously… it is not about causing $50-100 billion in damage,” he adds. “Today, it is about stealing identities, credit card numbers and other confidential data for profiteering on the underground market.”

While enterprises have IT teams and large budgets to deal with these problems, it is the individual consumer who faces a huge challenge in keeping the hackers at bay. According to the Norton Online Living Report, adults in India (67 per cent), Italy (68 per cent) and Japan (72 per cent) are least likely to install security software and a fifth of all respondents globally don’t have any solutions installed at all. Indians, incidentally, are the most likely to share secrets online, with 37 per cent of Indian respondents rekindling romances online. Ninety-nine per cent of Indian respondents said they take steps to secure their personal information, but half of them visit untrusted sites, do not create data backup, and have unsafe passwords, and one-in-three have been hacked.
Many consumers often opt for free security solutions off the Internet, but large vendors say this move may be counter-productive. “Most of these free packages are usually focussed just on one area like virus detection... they have a very high rate of false positives, which could do more damage than good,” says McAfee’s DeWalt. With the constant growth of threats, free security vendors won’t be able to keep pace with the number of patches and fixes required, he adds.
Growing pain
|
According to M.S. Rao, the Co-founder of security consulting firm Aujas Networks, companies need to change their focus from perimeter software such as intrusion protection and prevention solutions to application security. “According to (technology researcher) Gartner, 75 per cent of attacks happened on the application and not on the operating system like Windows,” says Rao. Besides, some companies, in financial services and insurance, for example, are extending the access to their IT networks to include agents and actuaries, and this includes the risks of infection.
As more people look beyond the PC and to the mobile and smart phone to access the Internet, they will quickly become the next big source of vulnerabilities, industry executives say. According to DeWalt: “Hackers can today make you download a seemingly innocent application off the web for an iPhone and without your knowledge activate the camera, dial an emergency line or activate the speaker phone,” he reveals. In Japan, for example, a botnet attack paralysed a mobile network by automatically dialling an emergency number and jamming the lines.
There are several types of threats emerging specifically for the mobile phone, says Symantec’s Ghosh. These include SMS-based threats, snoopware where applications can be enabled or disabled, malware transferred using Bluetooth and the latest threats, called Pranking4Pprofits, where value added services are commandeered. With over nine million subscribers added in February this year alone, this would perhaps be the fastest growing threat yet.