Sunday, July 20, 2014

RISE IN INFECTIONS:

RISE IN INFECTIONS:
                        Between 2011 and 2012 rise in BOT infections was 280%. 280mn. Spam messages per day are sent globally from India.
                               
 





280%                                      17%                                15%
                   2011 – 2012                       Spam Zombies                of Global BOT- net spam

BAD BOTS:   includes  (a)  Spammers  (b)  Hacking Tools  (c)  Impersonators  (d)  Scrapers (may also be good one)
DAMAGE:     Data Theft, Malware Injection and Distribution, Website/server hijacking, Website defacement and content deletion.
TARGET:      Anyone, most commonly travel industry websites, classifieds, news sites, e-stores and forums.

MAJOR BOT INFECTED CITIES IN INDIA:                                                                                                                                       
Chandigarh, Ghaziabad, Jaipur, Ahmedabad, Indore, Surat, Kolkata, Bhuvaneshwar, Vishakhapatnam, Mysore, Cochin.

KNOW YOUR BOTS:
                Not all BOTs are used with a negative intent. Some help in Research and Monitoring.

THE MALICIOUS BOT:
                BOTs can be effectively used to impersonate and to hack accounts leading to financial losses and Intellectual Property Theft. “Theft of personal details; username and password to operate one’s bank account is a classic example of how BOTs can lead to financial loses.
                “It is an organised Cyber-Crime,” explains Mukesh Saini, Commander (Rtd.) and former National Security Co-ordinator Govt. of India. In May 2013 cyber criminals broke into the Mumbai based account of the RPG group and siphoned off approximately Rs. 2.4 crores. Later 3 people were arrested in this case.

NHTs increasing rate is alarming. Any computer connected to the internet is vulnerable to such attacks. The user will not get to know about it unless he or she has installed an internet security application. Besides BOTs, computers also generate other kinds of secondary activities while the user is surfing the internet. This activity remains in background and is never seen by the user, unlike the BOT generated pop-ups. For example, your computer might be used as a channel to reach a server with the intention of hacking it; and you will never know.

THE GOOD BOTS:

                Not all NHT are bad though. In fact good BOTs such as Scrapers can effectively use to conduct research. Good BOTs are also used by search engines to track content on websites and enhance their search results. Search BOTs and other good BOTs formed 31% of total BOTs.

continued............../Ref.: Hindustan Times, 5th January 2014

Friday, July 18, 2014

EASY PRAY:
Unsecured wi-fi connections are vulnerable to BOT attacks. Statistics shows that Indians using unsecured wi-fi connections and the functions the performs here are as per below mention uses –
1)      61% -     Indians access their Social Network Accounts through this.
2)      54% -     Indians access their personal e-mail through this.
3)      42% -     Indians access their Bank Accounts through this type of connections.

4)      44% -     Indians shop online through this unsecured Wi-Fi connections.

INDIA’S SHARE IN GLOBAL CYBER-CRIME INCIDENTS
    11%    Ransom ware                    11%  Identity-Theft                        9%   Phishing

SUSPICIOUS TRAFFIC IN THE US                                          
Q.2-2013                                            WEB - 42%                         MOBILE - 22%    
Q.3-2013                                            WEB - 51%                         MOBILE - 27%

WORLD AVERAGE NUMBER OF TARGETED ATTACKS PER DAY

Source:  Symantech’s                      116%
Internet Security Threat                            82%
Report; Norton Report;                                       77%
Kaspersky Lab Cyber-Threat                   
Report, Solve Media,
Incapsula.

BAD BOTS:   includes  (a)  Spammers  (b)  Hacking Tools  (c)  Impersonators  (d)  Scrapers (may also be good one)
DAMAGE:     Data Theft, Malware Injection and Distribution, Website/server hijacking, Website defacement and content deletion.
TARGET:       Anyone, most commonly travel industry websites, classifieds, news sites, e-stores and forums.
Continued -  Ref:  Hindustan Times dtd. 5th January 2014




Wednesday, July 9, 2014

COMBATING NHT: (Part Three)

COMBATING NHT: 
(Part Three)
Most servers have defence mechanisms to tackle spam and cyber-attacks. Websites are also asking for human authentication which is difficult for a BOT to execute. Still, personal computers should be equipped with strong Internet Security Applications such as Anti-virus and Anti-spyware to prevent hacking and phishing attempts and to prevent being used as slave machines for distributed cyber-attacks. We need to watch out where and how we go online.
2013 Norton Report says, “61% Indian access their social network accounts from unsecured wi-fi connections, while 42% access bank accounts and 44% shop online using unsecured wi-fi connections.”
Social media companies gradually devising mechanisms to filter BOTs.
Facebook’s site integrity policy mentions, “When a page and a fan connect on Facebook, we want to ensure that connection involves a real person interested in hearing from a specific page and engaging with that brand’s content. As such, we have recently increased our automated efforts to remove likes on pages that may have been gained by means that violate our terms.”
Agency-client intervention is necessary to ensure that artificial traffic is not presented as real. It is also important to make all agencies, advertisers and clients aware of their responsibility to keep the Internet free from malicious NHT.
Government involvement is also needed to control the problem of malicious BOTs. Until we have robust mechanism to filter out bogus traffic from real, it will be difficult to say whether the social media followers are human or not.

Continued…………… -  Ref:  Hindustan Times dtd. 5th January 2014