Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Botnet evolution has reached its next tipping point, as political and activist interests become the principal driving force behind denial-of-service (DoS), espionage and other attacks, according to a new report released today by Prolexic.
The network protection company said that it is seeing around 50 DoS attacks launched against its customers every day, and that zero-day attacks have increased in number and sophistication, indicating that they may be state-sponsored.
"There are [hacking] groups developing new methods. It seems to be the result of real R&D dollars being spent. These are structured programmes which probably have state funding," said Prolexic chief technology officer Paul Sop.
"Three countries stand out in their proactive hacking and attacking capabilities: the US, Israel and China. Others are not funded to the same level. "
Present activity is mainly confined to "posturing" as the various parties engage in skirmishes to test their attack capabilities, but these are likely to give way to more serious attacks in the future, Sop explained.
Moreover, political entities are extremely careful to ensure that any links between themselves and the cyber criminals are undetectable, he added.
Non-politically motivated, activist-related botnet activity is also increasing, according to Prolexic. Two attacks against perfume companies last year are typical of this new breed of cyber attack, in that they were carried out for ideological reasons rather than being led by organised crime for financial gain or industrial sabotage.
Prolexic is currently tracking about 4,300 command and control servers which manipulate millions of botnet-controlled computers, and warned that the attacks are becoming increasingly sophisticated and targeted in nature.
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.