| It's not enough for the authorities to discover who is behind a malware attack. To secure a successful conviction, it's also necessary for victims to report that a crime has taken place.
As the following case demonstrates, any member of the computer-using public could be the vital piece of the jigsaw which helps bring about the downfall of a cybercriminal.
In November 2006 a particularly aggressive piece of malware came to the notice of Scotland Yard's Computer Crime Unit. The malware in question was an IRCBot, with worm-like properties detected by Sophos as W32/Vanebot-R.
Close examination of the malware revealed that it used various propagation vectors to spread:
MS SQL servers "protected" by weak passwords
Network shares
A critical security vulnerability in Microsoft Server Service that could allow remote code execution (MS06-040)
Instant Messaging Read More .. |