Bots, malware getting harder to detect Attackers have raised their game markedly in the past three months, delivering salvos harder to resist (and detect). Recent developments:Advanced phishing In the parry and thrust of phishing defenses and phishing attacks, one particular e-mail, sent to bank employees, represented a bold move for the bad guys in its level of social engineering sophistication: It pretended to be from a journalist researching a news story about a data leak at that bank, and addressed the recipient by first name.“Dear ____,” the e-mail started. “I am a reporter for Finance News doing a follow-up story on the recent leak of customer records from [the bank’s name]. I saw your name come up in the article from Central News and would like to interview you for a follow-up piece.”The e-mail then provided what appeared to be a link to the “Central News” story—a URL that included the bank’s name in its characters. The message ended, “If you have time I would appreciate an opportunity to further discuss the details of the above article. Regards, Gordon Reily.”At one bank, hundreds of employees received the e-mail. The CSO at that bank (he would speak only on the condition of anonymity) eventually determined that clicking on the link connected to a website in China and installed a keylogger on the machine that accessed the link. Such a targeted attack would seek to have a bank employee with data access unwittingly log passwords and account information, which the bot would deliver to the attacker.The e-mail was sophisticated; its grammar was impeccable, and it addressed recipients by name (which means the attacker had access to the bank’s e-mail rolls and could avoid blasting the e-mail and getting caught in spam filters). The guise of a journalist following a story was reasonable. And the e- mail suggested that the recipient was cited in a previous story, which would pique the person’s interest. IM as distribution network Chris Boyd, director of malware research at FaceTime Communications, came across a botnet in development that enabled an attacker to insert a link into an IM conversation that, when clicked, installed a bot on that computer. It appeared that the compromised computer then would become part of a spam distribution botnet. But after analyzing the “ridiculously complex and bizarre” code, Boyd believes that the attackers were still developing the botnet’s capabilities to go far beyond that.Mastering the use of IM as a malware distribution engine concerns Boyd and others, because once attackers can insert their links, it’s hard to stop them. For example, even if the IM network blocks certain IP addresses and link hosts from getting on its network, “it takes five minutes to change the link,” Boyd says. That’s a lot of time for an IM network that has more than 80 million users. The specter of CSRF Cross-site request forgery, or CSRF, is when an attacker loads a URL for, say, online banking into a page he controls. If a user visited the bank site but didn’t log out and then went to the site the hacker controls, she would still be logged in to the banking session, a cookie would authenticate her, and the URL the hacker injected into the site would continue the banking session. A test example of CSRF was used to add movies to people’s NetFlix queues without their knowledge.li> Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe