SlideShare uma empresa Scribd logo
1 de 31
Crimeware FingerprintingCharacteristics of Crimenet-Controlled Bot Behavior & The Underground Cyber Economy Joseph Ponnoly MBA, MSc, CGEIT, CISM, CISA, CISSP
Botnets , Bots & Crimeware Online financial crimes Targets & Attack Mechanisms  Criminals  Underground Cyber Economy Countermeasures Understanding Crimeware
Bots, Botnets & Crimeware
BotnetsThe No. 1 Internet Security Threat
Botnets  (networks of hijacked or zombie computers) Bypass traditional network security mechanisms Large botnets control an army of over a million nodes  Sending 22 to 24 Gbps data- can throttle the Internet 3 Dutch botnet operators arrested September 2005- controlled 1.5 million machines- used them to extort money from a US company, to steal identities and distribute spyware Thr34t Krew – botherder massive DDoS attacks  and  warez (stolen software distributions) Criminal marketplace Spam botnets to watch in 2009 (Secureworks) Botnets
Bots (automated malicious software)  Planted on host computers lie low without the owner’s knowledge Bot binaries (malware) help the botmaster to remotely control the hijacked nodes using remote command and control Bots immune to traditional malware defenses (use zero day or real time exploits,  avoid detection through polymorphism Bots
[object Object]
Trojans or bots (automated malicious software agents)
Use zeroday  or real time exploits (Immune to traditional malware defenses), Avoid detection using polymorphism
Specifically targeted at machines
Facilitates online crimes
Controlled by CrimenetsSpam Bots Banking Trojans targeting Brazilian banks What is crimeware?
[object Object]
IRC is an Internet communications protocol
attractive aspects for operators in the underground economy:
REALTIME GROUP communications,
requires very little bandwidth,
IRC client software is freely available across all operating system
Others: HTTP, P2PCommunication Protocols used
DDoS botnets for rent
Crimes http://www.youtube.com/watch?v=pzKmzO_Xq3k
[object Object]
Identity theft
Distribution of spyware
Denial of service attacks
Financial crimes
Targeted Phishing attacks (Spear Phishing, Whaling)Crimeware controlled Crimes
Extortion 2004: bot-driven DDoS attacks against online gambling sites, used for extortion Identity theft Data Theft: confidential data useridsand passwords credit card data, Social Security Numbers sensitive files (corporate espionage, political espionage) Underground Economy Servers controlled by Botnetoperators store and distribute illegal software or credit card data Rent out botnets for spamming, distribute spyware, distributed denial of service attacks or spear phishing Online Financial Crimes controlled by CrimeNets
Dutch botnet operators (2005)- controlled 1.5 million machines Used for extorting money from a US company, to steal identities, distribute spyware Used Toxbot Trojan to infect the compromised machines
Targets

Mais conteúdo relacionado

Mais procurados

Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Nicholas Davis
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
Cyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ VikjavaCyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ VikjavaSecurity Bootcamp
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareEntrust Datacard
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
DENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKSDENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKSHackingmantra
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_clubAntz911
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020SecPod Technologies
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackCSCJournals
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
Panda Security - The Hotel Hijackers
Panda Security - The Hotel HijackersPanda Security - The Hotel Hijackers
Panda Security - The Hotel HijackersPanda Security
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Preethi T G
 
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Securitysumit saurav
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker PlagueLuke Perrin
 

Mais procurados (20)

Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Botnet
BotnetBotnet
Botnet
 
Cyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ VikjavaCyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ Vikjava
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
Botnets
BotnetsBotnets
Botnets
 
Hack
HackHack
Hack
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
DENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKSDENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKS
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_club
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Panda Security - The Hotel Hijackers
Panda Security - The Hotel HijackersPanda Security - The Hotel Hijackers
Panda Security - The Hotel Hijackers
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .
 
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Security
 
Hacking
HackingHacking
Hacking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
 

Destaque

Антивирусная защита компьютерных систем
Антивирусная защита компьютерных системАнтивирусная защита компьютерных систем
Антивирусная защита компьютерных системdinolandy
 
Securitystronghold presentation-antivirus
Securitystronghold presentation-antivirusSecuritystronghold presentation-antivirus
Securitystronghold presentation-antivirusw_harker
 
資訊作業 機器人
資訊作業 機器人資訊作業 機器人
資訊作業 機器人guest27466b
 
WatchGuard Technologies. Эффективная защита сети и бюджета.
WatchGuard Technologies. Эффективная защита сети и бюджета.WatchGuard Technologies. Эффективная защита сети и бюджета.
WatchGuard Technologies. Эффективная защита сети и бюджета.BAKOTECH
 
Antivirus
AntivirusAntivirus
AntivirusLOVEEAT
 
классификация вредоносного по
классификация вредоносного поклассификация вредоносного по
классификация вредоносного поanna.korovko
 
Антивіруси
АнтивірусиАнтивіруси
АнтивірусиTheGameBars
 
хвороба Альцгеймера. Alzheimer's disease
хвороба Альцгеймера. Alzheimer's diseaseхвороба Альцгеймера. Alzheimer's disease
хвороба Альцгеймера. Alzheimer's diseaseVasyl Nagibin
 
путешествие во владения графа информатики
путешествие во владения графа информатикипутешествие во владения графа информатики
путешествие во владения графа информатикиserg_brinza
 
Построение системы защиты банкомантых сетей
Построение системы защиты банкомантых сетейПостроение системы защиты банкомантых сетей
Построение системы защиты банкомантых сетейLETA IT-company
 
Информационная безопасность
Информационная безопасностьИнформационная безопасность
Информационная безопасностьTania Evlampieva
 
урок "Информационная безопасность"
урок "Информационная безопасность"урок "Информационная безопасность"
урок "Информационная безопасность"Aliya Abulkina
 
Информационная безопасность
Информационная безопасностьИнформационная безопасность
Информационная безопасностьEvgeniya0352
 
10 Leadership Lessons I Wish I Learned In My 20's
10 Leadership Lessons I Wish I Learned In My 20's10 Leadership Lessons I Wish I Learned In My 20's
10 Leadership Lessons I Wish I Learned In My 20'sTodd Wilms
 
домашняя работа 6
домашняя работа 6домашняя работа 6
домашняя работа 6Yana Silaeva
 

Destaque (20)

Антивирусная защита компьютерных систем
Антивирусная защита компьютерных системАнтивирусная защита компьютерных систем
Антивирусная защита компьютерных систем
 
Securitystronghold presentation-antivirus
Securitystronghold presentation-antivirusSecuritystronghold presentation-antivirus
Securitystronghold presentation-antivirus
 
資訊作業 機器人
資訊作業 機器人資訊作業 機器人
資訊作業 機器人
 
ESET
ESETESET
ESET
 
WatchGuard Technologies. Эффективная защита сети и бюджета.
WatchGuard Technologies. Эффективная защита сети и бюджета.WatchGuard Technologies. Эффективная защита сети и бюджета.
WatchGuard Technologies. Эффективная защита сети и бюджета.
 
антивирусные программы
антивирусные программыантивирусные программы
антивирусные программы
 
Antivirus
AntivirusAntivirus
Antivirus
 
классификация вредоносного по
классификация вредоносного поклассификация вредоносного по
классификация вредоносного по
 
Антивіруси
АнтивірусиАнтивіруси
Антивіруси
 
virusi
virusivirusi
virusi
 
хвороба Альцгеймера. Alzheimer's disease
хвороба Альцгеймера. Alzheimer's diseaseхвороба Альцгеймера. Alzheimer's disease
хвороба Альцгеймера. Alzheimer's disease
 
путешествие во владения графа информатики
путешествие во владения графа информатикипутешествие во владения графа информатики
путешествие во владения графа информатики
 
Virus
VirusVirus
Virus
 
Построение системы защиты банкомантых сетей
Построение системы защиты банкомантых сетейПостроение системы защиты банкомантых сетей
Построение системы защиты банкомантых сетей
 
Информационная безопасность
Информационная безопасностьИнформационная безопасность
Информационная безопасность
 
урок "Информационная безопасность"
урок "Информационная безопасность"урок "Информационная безопасность"
урок "Информационная безопасность"
 
Информационная безопасность
Информационная безопасностьИнформационная безопасность
Информационная безопасность
 
10 Leadership Lessons I Wish I Learned In My 20's
10 Leadership Lessons I Wish I Learned In My 20's10 Leadership Lessons I Wish I Learned In My 20's
10 Leadership Lessons I Wish I Learned In My 20's
 
домашняя работа 6
домашняя работа 6домашняя работа 6
домашняя работа 6
 
20 Jobs of the Future
20 Jobs of the Future20 Jobs of the Future
20 Jobs of the Future
 

Semelhante a Crimeware Fingerprinting Final

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)DCIT, a.s.
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert TrendSC Leung
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxadnis1
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxhelen23456789
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
ADM 316 Workshop 5 Slides
ADM 316 Workshop 5 SlidesADM 316 Workshop 5 Slides
ADM 316 Workshop 5 SlidesRuss Ray
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 

Semelhante a Crimeware Fingerprinting Final (20)

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
Polinter11
Polinter11Polinter11
Polinter11
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Network security
Network securityNetwork security
Network security
 
ADM 316 Workshop 5 Slides
ADM 316 Workshop 5 SlidesADM 316 Workshop 5 Slides
ADM 316 Workshop 5 Slides
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 

Crimeware Fingerprinting Final

  • 1. Crimeware FingerprintingCharacteristics of Crimenet-Controlled Bot Behavior & The Underground Cyber Economy Joseph Ponnoly MBA, MSc, CGEIT, CISM, CISA, CISSP
  • 2. Botnets , Bots & Crimeware Online financial crimes Targets & Attack Mechanisms Criminals Underground Cyber Economy Countermeasures Understanding Crimeware
  • 3. Bots, Botnets & Crimeware
  • 4. BotnetsThe No. 1 Internet Security Threat
  • 5. Botnets (networks of hijacked or zombie computers) Bypass traditional network security mechanisms Large botnets control an army of over a million nodes Sending 22 to 24 Gbps data- can throttle the Internet 3 Dutch botnet operators arrested September 2005- controlled 1.5 million machines- used them to extort money from a US company, to steal identities and distribute spyware Thr34t Krew – botherder massive DDoS attacks and warez (stolen software distributions) Criminal marketplace Spam botnets to watch in 2009 (Secureworks) Botnets
  • 6. Bots (automated malicious software) Planted on host computers lie low without the owner’s knowledge Bot binaries (malware) help the botmaster to remotely control the hijacked nodes using remote command and control Bots immune to traditional malware defenses (use zero day or real time exploits, avoid detection through polymorphism Bots
  • 7.
  • 8.
  • 9. Trojans or bots (automated malicious software agents)
  • 10. Use zeroday or real time exploits (Immune to traditional malware defenses), Avoid detection using polymorphism
  • 13. Controlled by CrimenetsSpam Bots Banking Trojans targeting Brazilian banks What is crimeware?
  • 14.
  • 15. IRC is an Internet communications protocol
  • 16. attractive aspects for operators in the underground economy:
  • 18. requires very little bandwidth,
  • 19. IRC client software is freely available across all operating system
  • 23.
  • 28. Targeted Phishing attacks (Spear Phishing, Whaling)Crimeware controlled Crimes
  • 29. Extortion 2004: bot-driven DDoS attacks against online gambling sites, used for extortion Identity theft Data Theft: confidential data useridsand passwords credit card data, Social Security Numbers sensitive files (corporate espionage, political espionage) Underground Economy Servers controlled by Botnetoperators store and distribute illegal software or credit card data Rent out botnets for spamming, distribute spyware, distributed denial of service attacks or spear phishing Online Financial Crimes controlled by CrimeNets
  • 30. Dutch botnet operators (2005)- controlled 1.5 million machines Used for extorting money from a US company, to steal identities, distribute spyware Used Toxbot Trojan to infect the compromised machines
  • 32.
  • 34. Brazilian Banks, European Banks: (Banking Trojans)
  • 41. Email-based phishing targeted PayPal, eBay and US BanksCrimeware Targets
  • 43. Attack Vectors: Phishing Keystroke loggers Social Engineering attacks (to open email attachments that contain crimeware) Email, the weapon of mass delivery of trojans ActiveX drive-by (on compromised or baiting websites) IM (Instant Messagin) Worm attacks (Conflicker Worm) to exploit security vulnerabilities of targeted systems Injection of crimeware to legitimate sites via cross-site scripting / web application vulnerabilities Insertion of crimeware into downloadable software Crimeware Attack Vectors
  • 44.
  • 45. Scripts and rootkits used to hide the exploits
  • 46. Dynamic IP addresses are used to escape detection
  • 47. Worm attacks to exploit security vulnerabilities of targeted systems
  • 48. Injection of crimeware into legitimate websites via cross-site scripting
  • 49. Insertion of crimeware into downloadable software
  • 54. Trojans (54% of top malicious code – Internet Security Report) Banking Trojans (Brazil) targeting banking transactions Authenticated session hijacking vs. key stroke loggers or credentials stealing (Session riding malware to make fraudulent transactions) Can bypass SSL encryption, traditional authentication and malware defenses Trojans targeting European Banks (eg. Haxdoor and Sinowal, Zeus) use wininet.dll hooks Payloads
  • 55. Banking trojans: Trojan monitors the system or user activity to identify when the user is banking online (Shahlberg, 2007) Hooking WinInet API fucntions Browser Helper Object Interface Window title enumeration (browser title bar contains a string in the filter list, the trojan logs the key strokes) DDE COM Interfaces Firefox Browser Extensions and Layered Service Provider Interface Capture user credentials Form grabbing Screen shots or video capture (for banks using ‘virtual keyboards’) Key stroke logging Injection of fraudulent pages or form fields Pharming Man in the Middle Attacks Attack Methods
  • 56. Haxdoor.gh uses form grabbing techniques Use Browser Helper Objects COM Interfaces API hooking Form grabbing accesses the data before it is encrypted using SSL2 Haxdoor.ki Banking Trojan hit Swedish Banks in January 2007 – Authenticated Session Hijacking Trojan displays an error message after the user has entered the password The trojan sends the authentication information to the server managed by the attacker. The attacker logs on to the bank account and transfers money to his own account or to a hired money mule Successful against banks not using one-time passwords or stronger authentication. Haxdoor Banking Trojan
  • 57. Cryptovirology Malware encrypts critical data on infected machines Extortionists demand money to restore data Data Theft Attacks Trial attacks start as sales promotion Followed by DDoSattcks or data theft attacks Data Aggregation for criminal purposes Attack methods --Contd
  • 59. Organized crime Banking Trojan Gangs operational in Brazil Phishing Gangs operating from Eastern Europe Crimeware kits sold in the black market Virus writers employed by cyber underground operators to create spyware and trojans Customizable Malware/Crimeware As a Service CWaS Crimeware manufacturing: Malware developers funded to develop malware trojans/crimeware Dynamics of the cybercrime underworld (Zhuge et al, 2007) Virus writers, web site crackers, virtual assets thieves collaborate to defraud victims Malicious Websites: Phishing Crimeware map by WebSense Security labs Major attacks from websites hosted in USA, Russia and China Criminal Profiles-Cybercrime Underworld
  • 60. Underground Economy Servers used by criminals (Symantec, 2008) Selling stolen information for identity theft Social security numbers, credit card information, passwords, personal identification numbers, email addresses, bank account information An economic model for China’s cybercrime underworld (Zhuge et al, 2007). Crimeware threat model and taxonomy (US Department of Homeland Security, 2006). Underground Cyber Economy
  • 61. Goods and services available for sale on underground economy servers
  • 62.
  • 64.
  • 65. Crimeware Bibliography Dunham, K., Melnick, J. (2009). Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. Auerbach Publications, Boca Raton, FL. Jakobsson, M., Ramzan, Z. (2008). Crimeware: Understanding New Attacks and Defenses, 1 ed. Addison-Wesley Professional. Emigh, A. (2006). The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond . Journal of Digital Forensic Practice, 1556-7346, Volume 1, Issue 3, 2006, Pages 245 – 260 Symantec. (2009). Internet Security Threat Report.