10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 6: Origin and destination <strong>of</strong> phishing attacks<br />

Origin <strong>of</strong> phishing attacks Destination <strong>of</strong> phishing attacks<br />

Source: Arbor Networks (http://www.arbornetworks.com/).<br />

Each region has its own digital ecosystem – or networks – and has developed<br />

technological capabilities according to their available skills, domestic context and local<br />

vulnerabilities. These have been characterised by some reports, 80 and can be<br />

summarised as follows.<br />

(A) The United States is still the major generator <strong>of</strong> malware and according to the<br />

latest Symantec report it is still the country with the most underground servers (hosting<br />

41 per cent <strong>of</strong> the total servers observed by Symantec from 2007 to 2008). 81 In 2006<br />

the United States was reported as the top country in the world hosting web-based<br />

malware. However, other reports argue that this position has been overtaken by China<br />

in 2007. 82<br />

(B) Much attention is placed on China when considering the future <strong>of</strong> cybercrime.<br />

China has more than 137 million computer users, one-quarter <strong>of</strong> whom play online<br />

games, and cybercriminals are feeding on this massive interest. Chinese hackers are<br />

currently focused on developing the Trojans that lift personal information from online<br />

80 MacAfee, (2008), “One Internet, many worlds”, Sophos Security Threats reports (2007, 2008).<br />

81 Symantec, (2008), “Symantec Report on the Underground Economy”, July 2007–June 2008. However, the<br />

report does not provide a total number <strong>of</strong> underground economy servers on which the study is based upon.<br />

82 Sophos Security Threats reports (2007, 2008).<br />

Page 29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!