Trojans 2 Crimeware Exploits Web 2.0 Technologies

##AUTHORSPLIT##<--->

Just when you thought life couldn't get any riskier for Web app developers, a new species of malicious code is poised to begin oozing onto our networks. Dubbed "Trojans 2.0" by Web security vendor Finjan, this new Web-borne threat leverages Web 2.0 technology--RSS feeds, social networks, blogs and mashups--to provide crackers with easy and scalable command-and-control schemes.

The Trojans 2.0 scheme exploits the trust that legitimate Web services have earned through reputation-based security services. The attackers use the malicious code for a wide range of bad behaviors, the company says, including:

  • Botnet delivery of spam;
  • Identity theft through keylogging; and
  • Highly sophisticated financial fraud, corporate espionage and business intelligence gathering.

"Until recently, the Trojans out there needed to phone home to the hacker to get these commands," Finjan's CTO, Yuval Ben-Itzhak, said. "So, if you could find the hacker's server and block it, either by IP or URL, you could avoid the attack of the data on your machine. But what we've found recently is that hackers are beginning to take advantage of Web 2.0 sites. Instead of the Trojan phoning home to the hacker's server, it's connecting to a blog or an RSS feed, where the Trojan is not communicating directly to the hacker's server, but sending the data to relatively trusted servers. Essentially, the hacker is using the Web 2.0 platform as an intermediate storage area."

Israel-based Finjan is a global provider of real-time, appliance-based Web security solutions. Its solutions utilize behavior-based technology to repel all types of Web-based threats from spyware to phishing, Trojans to obfuscated malicious code.

The company ID'd the new threat (which it calls "crimeware") in the latest report from its Malicious Code Research Center.

In its report, the company cites "financial reward" as the key driver for malicious code evolution in the coming year. The attacks will become more sophisticated, leveraging advanced Web 2.0 techniques and services to "heighten infection ratios and decrease detection rates." Ironically, Web 2.0 seems to be providing the black hats with more robust and scalable attack frameworks, Ben-Itzhak said, enabling them to hide malicious code within "legitimate" Web traffic.

"Using Web 2.0, these hackers can go undetected," Ben-Itzhak said, "because now there's an intermediary."

How do we protect ourselves from this new threat?

Not surprisingly, Ben-Itzhak recommends that enterprises embark on a strict regimen of infection prevention using real-time malware scanning technology.

"You need security technology that doesn't rely on signatures or URLs," he said, "but that scans the actual code of the Web site, trying to find out what the code is about to do. Is it about to delete a file, change settings--and then it decides if this page includes malicious code, and blocks it based on that."

What do you do if your site is infected? Monitor the outgoing traffic for suspicious behavior.

"You scan the code to make sure that confidential data isn't going out," he said. "The combination of the two is necessary to secure a corporate network."

Finjan's Web security trend report includes examples of this type of attack, along with details and step-by-step diagrams. The report is available here for download, without registration.

READ MORE DAILY NEWS


About the author: Keith Ward is online news editor for the Redmond Media Group. You can contact him at [email protected].

Proposals for articles and tips for news stories, as well as questions and comments about this publication, should be submitted to David Nagel, executive editor, at [email protected].

About the Author

John K. Waters is a freelance journalist and author based in Mountain View, CA.

Featured

  • robot brain with various technology and business icons

    Google Cloud Study: Early Agentic AI Adopters See Better ROI

    Google Cloud has released its second annual ROI of AI study, finding that 52% of enterprise organizations now deploy AI agents in production environments. The comprehensive survey of 3,466 senior leaders across 24 countries highlights the emergence of a distinct group of "agentic AI early adopters" who are achieving measurably higher returns on their AI investments.

  • ClassVR headsets

    Avantis Education Launches New Headsets for ClassVR Solution

    Avantis Education recently introduced two new headsets for its flagship educational VR/AR solution, ClassVR. According to a news release, the Xcelerate and Xplorer headsets expand the company’s offerings into higher education while continuing to meet the evolving needs of K–12 users.

  • open laptop with data streams

    OpenAI Launches AI-Powered Web Browser

    OpenAI has unveiled ChatGPT Atlas, a standalone browser that places ChatGPT at the heart of everyday web activity. This release represents a major expansion of the company's efforts to reshape how users search, browse, and complete tasks online.

  • students using laptops and collaborating on an AI project with digital graphics and neural networks displayed in the background

    Presidential AI Challenge Seeks Innovative AI Solutions for Learning and Community

    The White House has officially launched its Presidential AI Challenge, an initiative first announced in President Donald Trump's April 23 Executive Order on AI education.