• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Cloud   »   Unlimited Computing Power at Your Fingertips

Unlimited Computing Power at Your Fingertips

  • Posted on:September 13, 2009
  • Posted in:Cloud
  • Posted by:Raimund Genes (Chief Technology Officer)
0

While Companies are still trying to figure out how the cloud will benefit them, cybercriminals have already figured it out.  They managed to infect so many computers that they have more computing power at their fingertips than all the world’s supercomputers combined.

Do they use it as a weapon of mass distruction? No, and why should they? Shutting down webpages is not the number one attack scheme.  Okay, you could hold the website owner for ransom, but there are more subtle ways to make money through cybercrime. On PCs, and sometimes on Macs, we see a lot of DNS changers, keyloggers, and other kinds of badware, intercepting the Internet traffic and fiddling around with it. One cybercrime group in Eastern Europe for example is changing 1.3 million web banners per day and rerouting 10 million Google Toolbar requests – that’s what you could call “Creative Marketing”.  And not only this, guys who are visiting sites with–shall we say–“adult” content are confronted with fake warnings, telling them that they are infected… over 100,000 users see this message per day, with a good deal of them then downloading a Fake AV program, and even willingly paying money for it.  And one might ask: Will they only use credit card information to withdraw the $49.95, or will they be more creative?

Winifighter

The internet has been used for years for malware activities, nothing new. What is amazing is how sophisticated the attackers are, how skillful they are at creating resilient networks, and how they always lure victims into their spider web. No amateurs anymore, so it is indeed a dark cloud, as  Uri Rivner blogged recently: http://www.rsa.com/blog/blog_entry.aspx?id=1508.

Is the average user aware of the dark cloud? I don’t think so.  A recent botnet study from Trend Micro shows  that some computers are infected (or reinfected all the time) for years.  Okay, most of these computers are used by home users, but 25% of the infected machines are within companies.

Question to the ISPs: If Trend Micro is able to detect malicious behavior from certain IP addresses, wouldn’t it be nice to work together to inform users about it? In a non-intrusive way, like from time to time a redirect to an informal “You are infected” page. Wouldn’t this reduce the amount of spam. Wouldn’t this make the Internet a better and safer place?

It should be the collective responsibility of ISPs, companies and individuals to fight back.  And not only with security products, but on a larger scale.  Better hardened computer system, responsible ISPs, and sensitive users who accept that the Internet has its dark side, and that it is up to all of us to change this. 

The minority of the Internet is bad, and it is in our best interest to ensure that the “Dark Cloud” gets smaller and smaller.  Even though our cars nowadays have all kinds of safety features, like seatbelts, airbags, etc., we still need lessons to get a driver license to drive a car.  Do we need a kind of driver license for the Internet? I bet the moment you read the last sentence you thought about censorship.  But ask yourself:  We accept driver licenses because cars can damage property and hurt people if not used properly. Many of us would like to see more control over financial systems because they have ruined people.

If the dark cloud gets bigger, you and I will stop doing online transactions over the internet, we will be more careful surfing, and sooner or later we won’t move and explore freely anymore because it is too dangerous.  So isn’t it better to apply a little more control now before it’s too late?

Related posts:

  1. Will New Net Neutrality Policy Slow Enterprise Cloud Adoption?
  2. The Link Between Browser Share, Cloud Computing, and Security
  3. The Pros and Cons of Public Cloud Computing
  4. Good Clouds, Evil Clouds: Why Microsoft Hasn’t Lost Yet in Cloud Computing

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.