Unwitting Collaborators, Part 10: System Hijacking Worms, Viruses & Trojan Horses
- Introduction: Tools of the Cyberterrorist
- The Virus Scenario
- The Security Breach
- Corrective Actions
- Don't Be an Unwitting Collaborator
Introduction: Tools of the Cyberterrorist
Worms, viruses, and Trojan horses used to penetrate the computers of unwitting victims have been around for a long time. Although worms, viruses, and Trojan horses are "oldies but goodies" in a hacker's kit bag, they still can deliver a damaging payload. And now, more ominous forms are appearing that can make previous virus attacks seem like a walk in the park.
The sad part of all these types of attacks is that many known viruses are long-lived because infected users either don't know they're infected or engage in practices that lend themselves to constant re-infection by the same or new viruses. If you look at McAfee's list of the top 10 viruses, you'll see entries for viruses that are over a year old, and yet still make the top 10!