{"id":15004,"date":"2014-09-16T17:17:25","date_gmt":"2014-09-16T17:17:25","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2571"},"modified":"2020-02-26T10:55:42","modified_gmt":"2020-02-26T15:55:42","slug":"where-have-all-those-malware-epidemics-gone","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/where-have-all-those-malware-epidemics-gone\/15004\/","title":{"rendered":"Where have all those malware epidemics gone?"},"content":{"rendered":"<p>Perhaps everyone older than 25 might remember those huge worm epidemics; they looked absolutely apocalyptic. For instance, the <a href=\"https:\/\/threatpost.com\/inside-story-sql-slammer-102010\/74589\" target=\"_blank\" rel=\"noopener nofollow\">SQL Slammer worm<\/a> crippled the Internet in its entirety in late January of 2003, almost cutting off large swaths of the Web, such as in South Korea. The worm hit most of its 75 thousand victims within ten minutes. It was like a tornado wreaking havoc globally.<\/p>\n<p>There were few equally powerful epidemics before and that, but, personally, I remember- ILoveYou\/LoveLetter, Anna Kournikova, Code Red, Melissa \u2013 all of them occured in late the 1990s and early 2000s. It all reminds me of the Simon &amp; Garfunkel\u2019s song: \u201cTime it was, and what a time it was\u2026\u201d<\/p>\n<p>Suddenly, however, they all seemed to go away. When was the last time we heard about some global malware epidemic? Nothing comes close to what Slammer did, or to the damage which ILoveYou caused: it was estimated that it cost the US $15 billion to remove the worm, while overall it hit about 45 million computers globally.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Where have all those malware epidemics gone? #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FkWT8&amp;text=Where+have+all+those+malware+epidemics+gone%3F+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Where are they now? Looks like malware of that scope is history now. Why? Many reasons could be given, some bring solace and some don\u2019t.<\/p>\n<p>The \u201cgood\u201d reasons are that most of those worms were exploiting multiple flaws in Microsoft Windows. Microsoft, since then, has improved the quality and security of its products, so another Slammer seems rather unlikely.<\/p>\n<p>The second reason is that security vendors learned lessons as well: behind the scenes there is a permanent arms race between malware authors and malware busters. A proactive approach to security is the result of this effort.<\/p>\n<p>The third reason is that users tend to become smarter: having at least some sort of protective solution on a PC is common now. However, the situation is not the same on mobile devices.<\/p>\n<p>There is, however, a fourth, darker reason. The malware itself changed as did the malware authors\u2019 goals. Profit motivates malware creators now.<\/p>\n<p>There is still probably a way to nuke the entire Web to shambles: this guess is pretty educated, given the #Heartbleed discovery earlier this year. Just imagine something \u201cslammer-like\u201d, exploiting this flaw. Or recall a well prepared DDoS-attack on the Internet root DNS servers that happened almost exactly 12 years ago. They were hit by \u201cthousands\u201d of malware-infected PCs, but modern <a href=\"https:\/\/business.kaspersky.com\/hunting-the-hydra-why-gameover-zeus-botnet-is-here-to-stay\/2265\" target=\"_blank\" rel=\"noopener nofollow\">botnets may account for millions of boxes<\/a>, ready to serve a next to unlimited supply of trash traffic to any target.<\/p>\n<p>Yet another attack took place in 2007, albeit less successful.<\/p>\n<p>Such would-be attackers will have a hard time trying to blackout the entire Web today; <a href=\"http:\/\/blog.erratasec.com\/2012\/02\/no-anonymous-cant-ddos-root-dns-servers.html#.VBg4Qfl_t8E\" target=\"_blank\" rel=\"noopener nofollow\">here\u2019s the explanation why<\/a>.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The internet still can be slammed and turned into shambles. But who wants this? #cybercrime #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FkWT8&amp;text=The+internet+still+can+be+slammed+and+turned+into+shambles.+But+who+wants+this%3F+%23cybercrime+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>But would these global attacks bring any profit? Nope. Neither did Slammer or other worms that spread globally. Perhaps, those worm authors received their share of glory in the blackhat underground, although it\u2019s quite surprising that the real author(s) of Slammer is (are) still unknown.<\/p>\n<p>Today\u2019s blackhats don\u2019t work just for this twisted kind of glory and demonstration of destructive power of their creations. They want your money.<\/p>\n<p>And they have many tools for this. <a href=\"https:\/\/business.kaspersky.com\/a-healthy-equinophobia-trojan-horses-explained\/2257\" target=\"_blank\" rel=\"noopener nofollow\">Trojans<\/a>, <a href=\"https:\/\/business.kaspersky.com\/knocking-on-a-backdoor-whats-behind-the-graphic-cybersecurity-term\/2245\" target=\"_blank\" rel=\"noopener nofollow\">backdoors<\/a>, malicious sites that inject your PC with malware via browser <a href=\"https:\/\/business.kaspersky.com\/can-we-beat-software-vulnerabilities\/2425\" target=\"_blank\" rel=\"noopener nofollow\">flaws<\/a>, <a href=\"https:\/\/business.kaspersky.com\/can-we-beat-social-engineering\/2363\" target=\"_blank\" rel=\"noopener nofollow\">social engineering<\/a>, fraud and whatever else to get to other people and businesses\u2019 finances via their PCs and mobile devices.<\/p>\n<p>The most common mobile <a href=\"https:\/\/business.kaspersky.com\/vulnerable-android-and-the-negligence-of-users\/1091\" target=\"_blank\" rel=\"noopener nofollow\">OS Android<\/a> today is often considered to have the same issues as Windows 10-15 years ago. However, today\u2019s security problems and challenges are different because in the 2000s cybercriminals were mostly just vandals, but now those script-kiddies have grown into full-sized professional thieves and robbers. So the owners of insecure mobile devices as well as businesses employing <a href=\"https:\/\/business.kaspersky.com\/typical-byod-threats\/814\" target=\"_blank\" rel=\"noopener nofollow\">BYOD<\/a> without additional security measures <a href=\"https:\/\/business.kaspersky.com\/vulnerable-android-and-the-negligence-of-users\/1091\" target=\"_blank\" rel=\"noopener nofollow\">are in greater danger<\/a> than users of antivirus-less Windows 98 back in the day.<\/p>\n<p>It would be wrong, however, to state that large-scale infections have gone away completely: huge botnets consist of numerous malware-infected PCs, thus they are the closest counterpart to the old-time epidemics. It\u2019s just the malware \u201cagents\u201d that are different.<\/p>\n<p>And the criminals\u2019 intent.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s been years since we&#8217;ve last heard of any large worm epidemics. Does it really mean that malware epidemics have gone away for good?<\/p>\n","protected":false},"author":209,"featured_media":15953,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[36,2186],"class_list":{"0":"post-15004","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-malware-2","10":"tag-worm-epidemics"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/where-have-all-those-malware-epidemics-gone\/15004\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/where-have-all-those-malware-epidemics-gone\/15004\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/where-have-all-those-malware-epidemics-gone\/15004\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/malware-2\/","name":"malware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15004"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15004\/revisions"}],"predecessor-version":[{"id":33319,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15004\/revisions\/33319"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15953"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}