I remember I saw a tweet back in 2016 about how malware had evolved over the years. Viruses, trojans, spyware – all of these were simply made to make money. Cybercriminals are really just out to make a profit. The goal? To make as much money as possible in as little time as possible. Over the years, cybercriminals have evolved from benign to outright hostile. Here, we list down a few techniques they had acquired.

 

1. Spamware
Since the dawn of internet messaging with DARPANET and the subsequent rise in the popularity of IRC post-World War II, people over the world have been finding a way to use the internet as a way to commercialize. Google, in the late 90s, was at first reluctant to join the trend of internet-for-business, but in the end, no one was safe.

 

In came Spamware. Spamware are means to send ads via emails. Some typically manage to stick to computers and send emails from the local user’s infected account. An example of these are the UDP-based trojans that serve as email tunnels, anonymizing the emails being sent.

 

These kinds of malware make money out of ad views and analytics. The more people view them, the greater the profits, and thus cybercriminals want to send as much spam as possible. In defense, email services now have Spam folders to keep potentially unwanted emails out.

 

2. Adware
After analytics became the fad of knowing the hits and views of a web page or ad, another vector of profit was made: Adware. Adware are viruses that stick via embedded Javascript or PHP, and show advertisements to the user whenever they see fit. Reminiscent of pop-up and pop-unders, they tend to be placed in web pages that must be viewed or interacted with first before execution.

 

What makes them different from pop-ups though, is that they tend to require that the authenticated user must manage to still see the ads even without viewing the web page, unlike in pop-ups and pop-unders where the ads cease when one stops browsing.

 

Examples of these are the ones that spread pre-2009 that showed pornography pop-ups even when offline. They still make the same money like pop-ups – they are dependent on analytics the same way.

 

3. Ransomware
When Bitcoin gained popularity in 2010 (after its doubtful rise in 2009), new trojans sprung out that targeted computers as vectors of a more direct form of exploitation of moolah: Ransomware.

 

Ransomware lock down the user’s device (computer, phone, smart TV, game console, and in one case even an entire Boeing 747) and would ask the user to give a specified amount of money to a cryptocurrency address (typically being Bitcoin or Monero). The attackers make use of the anonymity and ease of using crypto addresses as payment. Paying them would be easy, and getting the passcode to get back the “kidnapped” device is as easy as getting an email after the transaction.

 

Examples of these are the WannaCry attacks that targeted small businesses worldwide. One attack even struck an airplane in March 2018.

 

4. BotNet services
Since cybercrime is turning into a business, naturally, companies spring from those businesses. Botnets are a network of “robots” – infected devices (routers, computers, even security cameras) that are used to work cooperatively on a single task, usually being Denial-of-Service attacks or mass computing (usually for password cracking).

 

Botnets tend to be based on what is called a RAT, or Remote Administration Tool, and is controlled by a C&C, or Command and Control device. They typically happen to spread very quietly, and most of the time, they are not even noticed to be there until they start to get their commands from their C&C. These botnets are “rented” to do tasks, from simple decryption for hashes, to spreading ads for psychological warfare.

 

An example of this is the Mirai Botnet, a Linux-based botnet that was so effective at spreading that it has been the subject of study in various universities worldwide. Some botnets are even “consensual,” as is the case with the Low Orbit Ion Cannon, a tool used by the hacktivist community Anonymous, where all “infected” users attack targets upon the request of one of their members at a forum on the internet.

 

Though there may be many means of making money, let’s always note that not all of these ways are good. Cybercrime pays, it turns out. We have to be ever vigilant, and learn to use antiviruses and remember to patch our computers on time, lest we fall prey to these infections.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Fortinet Positioned Furthest for Completeness of Vision in the Challengers Quadrant of Gartner’s First Magic Quadrant for WAN Edge Infrastructure
Techworld Date Posted: 28 November 2018 1:24 PM | 151 Views
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced their inclusion in Gartner’s first Magic Quadrant for WAN Edge Infrastructure as a Challenger with the furthest placement for.... See More
 
Fortinet Positioned Furthest for Completeness of Vision in the Challengers Quadrant of Gartner’s First Magic Quadrant for WAN Edge Infrastructure
Techworld Date Posted: 1:24 PM | 151 Views
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced their inclusion in Gartner’s first Magic Quadrant for WAN Edge Infrastructure as a Challenger with the furthest placement for...See More

 
SAP, Accenture Collaborate to Nurture Next Generation of IT Talent in the Philippines
Techworld Date Posted: 24 August 2017 10:30 AM | 357 Views
SAP SE (NYSE: SAP), in collaboration with Accenture, announced a new next-generation program that aims to provide mentorship and skills development for future IT talent in the Philippines. The program aims to benefit 500.... See More
 
SAP, Accenture Collaborate to Nurture Next Generation of IT Talent in the Philippines
Techworld Date Posted: 10:30 AM | 357 Views
SAP SE (NYSE: SAP), in collaboration with Accenture, announced a new next-generation program that aims to provide mentorship and skills development for future IT talent in the Philippines. The program aims to benefit 500...See More

 
Transcend®’s DrivePro 550 Dashcam Provides Added Protection with Its Dual Lenses
Techworld Date Posted: 27 June 2018 1:17 PM | 573 Views
Transcend® Information, Inc. (Transcend®), a leading manufacturer of storage and multimedia products, is proud to announce the release of the DrivePro 550 Dashcam. Featuring a dual lens camera and a large viewing angle, the.... See More
 
Transcend®’s DrivePro 550 Dashcam Provides Added Protection with Its Dual Lenses
Techworld Date Posted: 1:17 PM | 573 Views
Transcend® Information, Inc. (Transcend®), a leading manufacturer of storage and multimedia products, is proud to announce the release of the DrivePro 550 Dashcam. Featuring a dual lens camera and a large viewing angle, the...See More

Rafael Aquino
Exportation and Importation of Electronics
Techworld • By: Rafael Aquino | Date Posted: 31 July 2017 9:37 AM | 275 Views
What are computers without electronic hardware? At this moment, hundreds, even thousands of ships across the globe travel and send electronic hardware to different points of the map.. See More
Rafael Aquino
Exportation and Importation of Electronics
Techworld • By: Rafael Aquino | Date Posted: 9:37 AM | 275 Views
What are computers without electronic hardware? At this moment, hundreds, even thousands of ships across the globe travel and send electronic hardware to different points of the map.See More

 
Kaspersky Lab Boosts Bug Bounty Program with New Reward of $100,000 – in Frame of its Global Transparency Initiative
Techworld Date Posted: 12 March 2018 10:41 AM | 745 Views
As part of its Global Transparency Initiative, Kaspersky Lab is extending its successful bug bounty program to include rewards of up to $100,000 for the discovery and responsible disclosure of severe vulnerabilities in some.... See More
 
Kaspersky Lab Boosts Bug Bounty Program with New Reward of $100,000 – in Frame of its Global Transparency Initiative
Techworld Date Posted: 10:41 AM | 745 Views
As part of its Global Transparency Initiative, Kaspersky Lab is extending its successful bug bounty program to include rewards of up to $100,000 for the discovery and responsible disclosure of severe vulnerabilities in some...See More

 
Shaping the Leaders of Tomorrow
Techworld Date Posted: 9 August 2017 2:55 PM | 313 Views
From left: Harriet B. Fernandez, Director, Computing and Information Services Office, Lennie K. Ong, University Treasurer, Edison B. Sasoy, Vice President for Administration, Fr. Roberto C. Yap, SJ, University President, Mr. Cricket Santiago, President.... See More
 
Shaping the Leaders of Tomorrow
Techworld Date Posted: 2:55 PM | 313 Views
From left: Harriet B. Fernandez, Director, Computing and Information Services Office, Lennie K. Ong, University Treasurer, Edison B. Sasoy, Vice President for Administration, Fr. Roberto C. Yap, SJ, University President, Mr. Cricket Santiago, President...See More

 
Concerns on the Rise about Mobile Apps Watching and Tracking Users, Finds Kaspersky Lab
Techworld Date Posted: 16 July 2018 4:28 PM | 469 Views
The monitoring capabilities of mobile apps are becoming a concern for users, many of whom are worried that the apps on their connected devices might be able track them down, watch what they’re doing,.... See More
 
Concerns on the Rise about Mobile Apps Watching and Tracking Users, Finds Kaspersky Lab
Techworld Date Posted: 4:28 PM | 469 Views
The monitoring capabilities of mobile apps are becoming a concern for users, many of whom are worried that the apps on their connected devices might be able track them down, watch what they’re doing,...See More

 
AOC Monitors Continuously Dominate the PH Market in Monitor Sales
Techworld Date Posted: 28 January 2019 4:25 PM | 147 Views
According to the most recent report from the International Data Corporation (IDC), the world’s premiere global market intelligence firm, AOC has once again overtaken the Philippine market in monitor sales during the third quarter.... See More
 
AOC Monitors Continuously Dominate the PH Market in Monitor Sales
Techworld Date Posted: 4:25 PM | 147 Views
According to the most recent report from the International Data Corporation (IDC), the world’s premiere global market intelligence firm, AOC has once again overtaken the Philippine market in monitor sales during the third quarter...See More

 
Victims of Malicious Crypto Miners Increase by 44% as 2.7 Million Internet Users Are Targeted in a Year
Techworld Date Posted: 10 July 2018 10:02 AM | 504 Views
The number of internet users that have been attacked by malicious crypto currency mining software has increased from 1.9 million to 2.7 million in just one year. Statistics for the last 24 months show.... See More
 
Victims of Malicious Crypto Miners Increase by 44% as 2.7 Million Internet Users Are Targeted in a Year
Techworld Date Posted: 10:02 AM | 504 Views
The number of internet users that have been attacked by malicious crypto currency mining software has increased from 1.9 million to 2.7 million in just one year. Statistics for the last 24 months show...See More

 
Digital Privacy Fatigue With Data Concerns on the Rise, 1-in-3 Don’t Know How They Can Fully Protect Their Privacy Online
Techworld Date Posted: 24 April 2019 4:36 PM | 66 Views
With the amount of personal data shared on the internet continuing to grow, some of us are resigned to think that any attempts to maintain online privacy will be doomed to failure. Kaspersky Lab.... See More
 
Digital Privacy Fatigue With Data Concerns on the Rise, 1-in-3 Don’t Know How They Can Fully Protect Their Privacy Online
Techworld Date Posted: 4:36 PM | 66 Views
With the amount of personal data shared on the internet continuing to grow, some of us are resigned to think that any attempts to maintain online privacy will be doomed to failure. Kaspersky Lab...See More


Power by

Download Free AZ | Free Wordpress Themes