Page 330 -
P. 330

Chapter 8 Securing Information Systems 329


                  Blogs, wikis, and social networking sites such as Facebook have emerged
               as new conduits for malware or spyware. These applications allow users to
               post software code as part of the permissible content, and such code can be
               launched automatically as soon as a Web page is viewed. On July 4, 2011, hack-
               ers broke into the “Fox News Politics” Twitter account, sending fake messages
               about President Barack Obama. The hackers changed the account's password,
               preventing Fox from correcting the messages for hours (Sherr, 2011).
                  Internet security firm Symantec reported in 2012 that it had detected 403
               million new and unique threats from malicious software in 2011, up from 286
               million in 2010. Symantec observed that the amount of harmful software in
               the world passed the amount of beneficial software in 2007, and as many as
               one of every 10  downloads from the Web includes harmful programs (Drew
               and Kopytoff, 2011). According to Symantec, 36 percent of malware today
               is being targeted at small businesses, because it is more difficult for such
               companies to protect themselves against so many different types of attacks
               (Symantec, 2012). Table 8.1 describes the characteristics of some of the most
               harmful worms and viruses that have appeared to date.
                  A Trojan horse is a software program that appears to be benign but then does
                 something other than expected. The Trojan horse is not itself a virus because it
               does not replicate, but it is often a way for viruses or other malicious code to be
                 introduced into a computer system. The term Trojan horse is based on the huge





               TABLE 8.1  EXAMPLES OF MALICIOUS CODE

                NAME          TYPE          DESCRIPTION
                Conficker (aka   Worm       First detected in November 2008 and still prevalent. Uses flaws in Windows software to take
                Downadup,                   over machines and link them into a virtual computer that can be commanded remotely. Had
                Downup)                     more than 5 million computers worldwide under its control. Difficult to eradicate.
                Storm         Worm/         First identified in January 2007. Spreads via e-mail spam with a fake attachment. Infected up to
                              Trojan horse  10 million computers, causing them to join its zombie network of computers engaged in
                                            criminal activity.
                Sasser.ftp    Worm          First appeared in May 2004. Spread over the Internet by attacking random IP addresses. Causes
                                            computers to continually crash and reboot, and infected computers to search for more victims.
                                            Affected millions of computers worldwide, disrupting British Airways flight check-ins, operations
                                            of British coast guard stations, Hong Kong hospitals, Taiwan post office branches, and Australia’s
                                            Westpac Bank. Sasser and its variants caused an estimated $14.8 billion to $18.6 billion in
                                            damages worldwide.
                MyDoom.A      Worm          First appeared on January 26, 2004. Spreads as an e-mail attachment. Sends e-mail to addresses
                                            harvested from infected machines, forging the sender’s address. At its peak, this worm lowered
                                            global Internet performance by 10 percent and Web page loading times by as much as 50
                                            percent. Was programmed to stop spreading after February 12, 2004.
                Sobig.F       Worm          First detected on August 19, 2003. Spreads via e-mail attachments and sends massive amounts
                                            of mail with forged sender information. Deactivated itself on September 10, 2003, after
                                            infecting more than 1 million PCs and doing $5 to $10 billion in damage.

                ILOVEYOU      Virus         First detected on May 3, 2000. Script virus written in Visual Basic script and transmitted as an
                                            attachment to e-mail with the subject line ILOVEYOU. Overwrites music, image, and other files
                                            with a copy of itself and did an estimated $10 billion to $15 billion in damage.
                Melissa       Macro virus/  First appeared in March 1999. Word macro script mailing infected Word file to first 50 entries in
                              worm          user’s Microsoft Outlook address book. Infected 15 to 29 percent of all business PCs, causing
                                            $300 million to $600 million in damage.









   MIS_13_Ch_08 Global.indd   329                                                                             1/17/2013   3:10:20 PM
   325   326   327   328   329   330   331   332   333   334   335