I remember I saw a tweet back in 2016 about how malware had evolved over the years. Viruses, trojans, spyware – all of these were simply made to make money. Cybercriminals are really just out to make a profit. The goal? To make as much money as possible in as little time as possible. Over the years, cybercriminals have evolved from benign to outright hostile. Here, we list down a few techniques they had acquired.

 

1. Spamware
Since the dawn of internet messaging with DARPANET and the subsequent rise in the popularity of IRC post-World War II, people over the world have been finding a way to use the internet as a way to commercialize. Google, in the late 90s, was at first reluctant to join the trend of internet-for-business, but in the end, no one was safe.

 

In came Spamware. Spamware are means to send ads via emails. Some typically manage to stick to computers and send emails from the local user’s infected account. An example of these are the UDP-based trojans that serve as email tunnels, anonymizing the emails being sent.

 

These kinds of malware make money out of ad views and analytics. The more people view them, the greater the profits, and thus cybercriminals want to send as much spam as possible. In defense, email services now have Spam folders to keep potentially unwanted emails out.

 

2. Adware
After analytics became the fad of knowing the hits and views of a web page or ad, another vector of profit was made: Adware. Adware are viruses that stick via embedded Javascript or PHP, and show advertisements to the user whenever they see fit. Reminiscent of pop-up and pop-unders, they tend to be placed in web pages that must be viewed or interacted with first before execution.

 

What makes them different from pop-ups though, is that they tend to require that the authenticated user must manage to still see the ads even without viewing the web page, unlike in pop-ups and pop-unders where the ads cease when one stops browsing.

 

Examples of these are the ones that spread pre-2009 that showed pornography pop-ups even when offline. They still make the same money like pop-ups – they are dependent on analytics the same way.

 

3. Ransomware
When Bitcoin gained popularity in 2010 (after its doubtful rise in 2009), new trojans sprung out that targeted computers as vectors of a more direct form of exploitation of moolah: Ransomware.

 

Ransomware lock down the user’s device (computer, phone, smart TV, game console, and in one case even an entire Boeing 747) and would ask the user to give a specified amount of money to a cryptocurrency address (typically being Bitcoin or Monero). The attackers make use of the anonymity and ease of using crypto addresses as payment. Paying them would be easy, and getting the passcode to get back the “kidnapped” device is as easy as getting an email after the transaction.

 

Examples of these are the WannaCry attacks that targeted small businesses worldwide. One attack even struck an airplane in March 2018.

 

4. BotNet services
Since cybercrime is turning into a business, naturally, companies spring from those businesses. Botnets are a network of “robots” – infected devices (routers, computers, even security cameras) that are used to work cooperatively on a single task, usually being Denial-of-Service attacks or mass computing (usually for password cracking).

 

Botnets tend to be based on what is called a RAT, or Remote Administration Tool, and is controlled by a C&C, or Command and Control device. They typically happen to spread very quietly, and most of the time, they are not even noticed to be there until they start to get their commands from their C&C. These botnets are “rented” to do tasks, from simple decryption for hashes, to spreading ads for psychological warfare.

 

An example of this is the Mirai Botnet, a Linux-based botnet that was so effective at spreading that it has been the subject of study in various universities worldwide. Some botnets are even “consensual,” as is the case with the Low Orbit Ion Cannon, a tool used by the hacktivist community Anonymous, where all “infected” users attack targets upon the request of one of their members at a forum on the internet.

 

Though there may be many means of making money, let’s always note that not all of these ways are good. Cybercrime pays, it turns out. We have to be ever vigilant, and learn to use antiviruses and remember to patch our computers on time, lest we fall prey to these infections.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Fake Facebook Sites Account for 60% of Social Network Phishing in Early 2018
Techworld Date Posted: 24 May 2018 1:32 PM | 200 Views
In the first quarter of 2018, Kaspersky Lab’s anti-phishing technologies prevented more than 3.6 million attempts to visit fraudulent social network pages, of which 60% were fake Facebook pages. The results, according to Kaspersky.... See More
 
Fake Facebook Sites Account for 60% of Social Network Phishing in Early 2018
Techworld Date Posted: 1:32 PM | 200 Views
In the first quarter of 2018, Kaspersky Lab’s anti-phishing technologies prevented more than 3.6 million attempts to visit fraudulent social network pages, of which 60% were fake Facebook pages. The results, according to Kaspersky...See More

Frank Emmanuel Trazo
Hewlett Packard Enterprise: One of Silicon Valley’s Pioneers
Techworld • By: Frank Emmanuel Trazo | Date Posted: 22 June 2017 9:03 AM | 1221 Views
Last May 2017, Hewlett Packard Enterprise (HPE) decided to open an Asia-Pacific headquarters in Singapore. . See More
Frank Emmanuel Trazo
Hewlett Packard Enterprise: One of Silicon Valley’s Pioneers
Techworld • By: Frank Emmanuel Trazo | Date Posted: 9:03 AM | 1221 Views
Last May 2017, Hewlett Packard Enterprise (HPE) decided to open an Asia-Pacific headquarters in Singapore. See More

 
Quick! Where’s my phone? There’s a human nearby
Techworld Date Posted: 5 October 2018 5:19 PM | 189 Views
Connected devices are becoming essential to keeping people in contact with each other, but for many they are also a much needed comfort blanket in a variety of social situations when they do not.... See More
 
Quick! Where’s my phone? There’s a human nearby
Techworld Date Posted: 5:19 PM | 189 Views
Connected devices are becoming essential to keeping people in contact with each other, but for many they are also a much needed comfort blanket in a variety of social situations when they do not...See More

 
SAP Calls for Public and Private Sector Organisations in the Philippines to Harness the Power of Data
Techworld Date Posted: 23 August 2017 1:34 PM | 259 Views
On photo: Ryan Poggi, Managing Director, SAP Philippines and Kathleen Muller, Head of Analytics and Insight, SAP Southeast Asia SAP SE (NYSE: SAP) said today it has harnessed its digital core, bold technologies of the.... See More
 
SAP Calls for Public and Private Sector Organisations in the Philippines to Harness the Power of Data
Techworld Date Posted: 1:34 PM | 259 Views
On photo: Ryan Poggi, Managing Director, SAP Philippines and Kathleen Muller, Head of Analytics and Insight, SAP Southeast Asia SAP SE (NYSE: SAP) said today it has harnessed its digital core, bold technologies of the...See More

 
Best Gadgets That Will Make Your Christmas Shopping a Breeze
Techworld Date Posted: 13 November 2018 3:55 PM | 146 Views
Make your Christmas shopping easier this 2018 with Gadget Goods Asia’s Christmas package as they offer five unique travel and work gadgets at great discounts. . See More
 
Best Gadgets That Will Make Your Christmas Shopping a Breeze
Techworld Date Posted: 3:55 PM | 146 Views
Make your Christmas shopping easier this 2018 with Gadget Goods Asia’s Christmas package as they offer five unique travel and work gadgets at great discounts. See More

 
CORSAIR and Lenovo Join Forces to Bring VENGEANCE LPX DDR4 to the Lenovo Legion™ Y920 Tower
Techworld Date Posted: 24 August 2017 10:44 AM | 216 Views
CORSAIR, a world leader in PC components, high-performance gaming hardware and enthusiast memory, today announced an exclusive OEM partnership with Lenovo to bring performance, overclockable memory to Lenovo's range of gaming PCs. Combining CORSAIR's.... See More
 
CORSAIR and Lenovo Join Forces to Bring VENGEANCE LPX DDR4 to the Lenovo Legion™ Y920 Tower
Techworld Date Posted: 10:44 AM | 216 Views
CORSAIR, a world leader in PC components, high-performance gaming hardware and enthusiast memory, today announced an exclusive OEM partnership with Lenovo to bring performance, overclockable memory to Lenovo's range of gaming PCs. Combining CORSAIR's...See More

 
Kaspersky Lab Launches ‘Secure Your Ferrari Experience’ Competition in Asia Pacific
Techworld Date Posted: 23 September 2017 11:41 AM | 280 Views
Kaspersky Lab has launched the ‘Secure Your Ferrari Experience' for the second year running, offering five winners from Asia Pacific a chance to visit the Home of Ferrari in Maranello, Italy. The "Secure Your Ferrari.... See More
 
Kaspersky Lab Launches ‘Secure Your Ferrari Experience’ Competition in Asia Pacific
Techworld Date Posted: 11:41 AM | 280 Views
Kaspersky Lab has launched the ‘Secure Your Ferrari Experience' for the second year running, offering five winners from Asia Pacific a chance to visit the Home of Ferrari in Maranello, Italy. The "Secure Your Ferrari...See More

 
Transcend Provides a Full Range of Solutions for Upgrading Mac Computers
Techworld Date Posted: 29 November 2017 4:36 PM | 212 Views
Transcend Information, a worldwide leader in storage and multimedia products, is proud to a full range of Apple solutions for upgrading Mac computers.. See More
 
Transcend Provides a Full Range of Solutions for Upgrading Mac Computers
Techworld Date Posted: 4:36 PM | 212 Views
Transcend Information, a worldwide leader in storage and multimedia products, is proud to a full range of Apple solutions for upgrading Mac computers.See More

 
Spy Spotting – What Careless Mistakes Reveal about Cyberespionage in APAC
Techworld Date Posted: 24 October 2017 10:22 AM | 280 Views
Kaspersky Lab’s Senior Security Researcher Noushin Shabab looks back at major cyberespionage cases that hit the Asia Pacific region to reveal the mistakes committed by cybercriminals that help researchers unmask their identity.   Errors.... See More
 
Spy Spotting – What Careless Mistakes Reveal about Cyberespionage in APAC
Techworld Date Posted: 10:22 AM | 280 Views
Kaspersky Lab’s Senior Security Researcher Noushin Shabab looks back at major cyberespionage cases that hit the Asia Pacific region to reveal the mistakes committed by cybercriminals that help researchers unmask their identity.   Errors...See More

 
Kaspersky Lab’s Statement on NotPetya Ransomware Attacks Reported 27 June
Techworld Date Posted: 4 July 2017 2:50 PM | 258 Views
Kaspersky Lab’s analysts are investigating the new wave of ransomware attacks targeting organizations across the world. Our preliminary findings suggest that it is not a variant of Petya ransomware as publically reported, but a.... See More
 
Kaspersky Lab’s Statement on NotPetya Ransomware Attacks Reported 27 June
Techworld Date Posted: 2:50 PM | 258 Views
Kaspersky Lab’s analysts are investigating the new wave of ransomware attacks targeting organizations across the world. Our preliminary findings suggest that it is not a variant of Petya ransomware as publically reported, but a...See More


Power by

Download Free AZ | Free Wordpress Themes