Judging from some of the headlines this week, it would appear that online avenues of security attack, such as those through eBay and PayPal in the US, for example, are starting to diminish, says Brett Myroff, CEO of master Sophos distributor, Netxactics.
These organisations are starting to play a bigger role in educating their users about the dangers of cybercrime, he explains.
"More companies are devoting sections on their own Web sites to expert security advice on what a spoof e-mail is, for example, and how to recognise one. Even locally, many of the banks are including disclaimers of sorts to advise and warn customers they would never request account information via e-mail. They also include methods to verify whether a communication is legitimate or not," says Myroff.
"There is also a greater push towards advising consumers on how they can help fight the overall problem."
Worms crawl in
This week`s malware roundup includes the W32/Feebs-BX worm, affecting Windows users and spreading via e-mail attachments. "It allows others to access the user`s computer, sends itself to e-mail addresses found on the infected computer, uses its own e-mailing engine and installs itself in the registry," Myroff explains.
W32/Feebs-BX creates ZIP archives containing a copy of the worm in folders used by peer-to-peer applications.
W32/Tilebot-KJ, another worm affecting the Windows platform, also allows others to access the computer and installs itself in the registry. Its aliases include W32/Backdoor.BBRZ, Backdoor.Win32.SdBot.bkq and IRC/SdBot Trojan.
"W32/Tilebot-KJ is a worm with IRC backdoor functionality for the Windows platform. It runs continuously in the background, providing a backdoor server that allows a remote intruder to gain access and control over the computer via IRC channels," says Myroff.
Silent crusaders
Trojans that made an appearance this week include Troj/Zlob-AFG, which affects the Windows OS. It drops more malware and downloads code from the Internet, and also occurs as TR/Dldr.Zlob.NMO.
The Troj/Agent-GEK Trojan downloads code from the Internet and installs itself in the registry. "Troj/Agent-GEK includes functionality to access the Internet and communicate with a remote server via HTTP," Myroff says.
While more effort is being made by security firms, such as Sophos, as well as by vulnerable online businesses, to wipe out Internet scams and fraud, hackers and malware writers still consider unprotected computers fair game, he says.
"Companies and individuals need to focus their own efforts on protecting themselves with a consolidated solution that can control network access and defend against the threats of spam, hackers, spyware and viruses," he concludes.
Editorial contacts

