Gone are the days of amateur, single-source security threats, as big business takes over creating an Internet filled with converged attacks.Computer security researcher Peter Gutmann, from University of Auckland in New Zealand, gave a dim overview of the types of sophisticated software now used to take over computers to conduct cybercrime.“There isn’t really any single threat anymore,” Gutmann said, adding as an example that spam is being used for identity theft.“We’ve seen over the last 20 years a convergence of network technologies into this one big cloud called the Internet, [and] the convergence of viruses and trojans into this one blended threat.” Speaking at this year’s Australian Unix Users Group (AUUG) conference in Melbourne, Gutmann said spam and malicious code are becoming more sophisticated, because the businesses proliferating such threats are hiring professionals—from programmers to psychologists.“Current viruses are written by paid professional programmers, and they do serious amounts of testing on different environments,” he said. “They’re not just written by script kiddies. Some use digitally signed, encrypted updates that are equivalent to the Windows update.” Spam “vendors” are using PhDs in linguistics to bypass filters, and phishers use psychology graduates to craft their scams.There is also some spamware that includes the open-source Spamassassin antispam tool in its code to see if it will get through.Gutmann said the spam business involves selling CDs with e-mail addresses at a price dependent on the quality of addresses.“You go via a spam broker and use money to buy credits to send out spam messages,” he said. “You can also buy ‘botnets,’ and a machine can spam for 30 seconds, then transfer to another bot which will spam for another 30 seconds, so it’s virtually impossible to track them down.”Gutmann said most spam services are hosted in China, where the ISPs don’t care about it and bandwidth is cheap.“Botnets are infinite resources of power and bandwidth,” he said, adding many botnets are IRC-based, which are not very resilient. However, the emergence of P2P botnets has made them more resilient and completely decentralized them. “Freely available robots, like Agobot, can do all types of nasties, from harvesting e-mail addresses to packet sniffing and rootkit functionality.“Ironically, botnets are full of good guys’ PCs being taken over to send spam from DSL and cable Internet connections.“With delivery mechanisms in place, malicious code has the ability to take control and manipulate the operating system down to the kernel level.“Viruses can act as special-purpose spam relays, disable antivirus software or modify antivirus database files, and one even uses multiple levels of encryption. “They’re extraordinarily difficult to detect and specifically coded to stop antivirus software from detecting it,” Gutmann said.Since a lot of software has user interface options to turn off security features, viruses can also be programmed to do this. Other common problems include installing rogue root certificates and patching the Windows kernel so that “everyone is running as root.”Gutmann cited BroadcastPC as an extreme example of malware that installs 65MB of .Net framework on the computer without the user being made aware of it.Regarding phishing, Gutmann said like spam and viruses, it is being orchestrated by professionally run organizations.By Rodney Gedda, Computerworld AustraliaKeep checking in at our Security Feed for updated news coverage. Related content news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Encryption Encryption news CISOs are struggling to get cybersecurity budgets: Report In the latter part of Q4 2022, many CISOs reported that their approved 2023 budgets were being slashed as part of an overall budget tightening. By Shweta Sharma Sep 26, 2023 4 mins Budget Technology Industry feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Authentication Identity Management Solutions opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO Encryption Threat and Vulnerability Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe