Skip Links

As PC Virus Turns 25, New Worry Emerges: Attack Toolkits

By Bill Snyder, CIO
January 18, 2011 11:15 AM ET

CIO - Happy anniversary Basit and Amjad! Twenty-five years ago this month, the Alvi brothers of Lahore, Pakistan, gave the world the Brain Virus, the first bit of malware capable of infecting a DOS-based PC. Back in those relatively innocent times, the brothers actually embedded their real names and business address in the code and later told Time magazine they had written the virus to protect their medical software from piracy.

Who knows what they were really thinking, but by all accounts the Brain Virus was relatively harmless. Twenty-five years later, most malware is anything but benign and cyber criminals pull off exploits the Alvi brothers never envisioned.

Slideshow: Quiz: Separate Cyber Security Fact From Fiction7 Cybercrime Facts Executives Need to Know

No longer just a way to make a political point or demonstrate one's technical prowess, malware has become a useful tool in the bag of tricks bad guys use to steal from consumers and institutions alike. And just as big-time drug dealers and many criminal gangs now mimic the ways of legitimate business, hackers have begun to do the same.

One particularly disturbing trend coming to light in this anniversary month is the production and online sale of "kits" that allow relatively unskilled hackers to create and launch malware attacks. And by "kit" I really do mean a kit. "Attack toolkits are bundles of malicious code tools used to facilitate the launch of concerted and widespread attacks on networked computers. Also known as crimeware, these kits are usually composed of prewritten malicious code for exploiting vulnerabilities along with various tools to customize, deploy, and automate widespread attacks," according to a recent report by Symantec.

Marc Fossi, a development manager for the giant security company, says attack kits are selling on the Web from $40 or $50 to about $4000. Some hackers peddling the higher-end kits even offer online support and subscription services, so customers can get updated versions of the malware. Symantec has also observed advertisements offering to help install and set up purchased attack kits for a fee. "It's like a mirror of the legitimate software business," he says.

Here are six reasons to be concerned:

1. Attack kits make it easier for relatively unsophisticated hackers to launch an attack. That's not to say that any computer-illiterate bozo could successfully use one of these kits, but it's much easier than building a virus or other malware from the ground up, says Fossi.

2. The prevalence, simplicity and effectiveness of the attack kits are contributing to an upward spike in cybercrime. For example, one major kit called ZeuS accounted for more than 90,000 unique malicious code variants as of August 2009. That's 90,000 different malware applications; the number of computers attacked by ZeuS is in the millions. Not coincidentally, ZeuS is designed primarily to steal financial details, such as the online banking credentials of a victim. Its ease of use and ability to generate income makes it an appealing purchase for even novice cybercriminals.

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News