10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

writers do not necessarily know how to exploit the vulnerabilities they identify; in other<br />

cases they are simply not willing to cross the safe line <strong>of</strong> legality. 136 Therefore, they<br />

need to distribute and sell their products to the next agents in the value chain. The<br />

products from hackers and malware writers are generally used by script kiddies<br />

(unskilled hackers) and botnet owners/botnet herders (those who run collections <strong>of</strong><br />

compromised computers).<br />

'Script kiddies’ usually describes those who use scripts or programmes developed by<br />

others to attack computer systems and networks. They are named ‘kiddies’ as they are<br />

generally assumed to be juveniles lacking the ability to write sophisticated hacking<br />

programmes on their own. They <strong>of</strong>ten use hacking manuals, free malware or do-it-<br />

yourself virus kits to search for vulnerabilities and exploit security breaches. Their<br />

participation in organised networks or gangs is supposedly limited, so we will not focus<br />

on their activities here. However, they are still considered dangerous because <strong>of</strong> their<br />

irresponsible use <strong>of</strong> sophisticated s<strong>of</strong>tware.<br />

Much less is known about the dynamics <strong>of</strong> botnets. Bots are malware programmes that<br />

are installed silently without the consent <strong>of</strong> the user. A botnet is a network <strong>of</strong> computers<br />

on which a bot has been installed, and is usually managed remotely from a command &<br />

control (C&C) server. The main purpose <strong>of</strong> botnets is to use the computers they have<br />

hijacked (also named ‘zombies’) for fraudulent online activities. They can be created by<br />

an individual (a hacker or a malware writer) but are generally managed by a group <strong>of</strong><br />

criminals or an organised crime syndicate. 137 Botnets can be exploited directly for<br />

identity theft or to spread mass campaigns <strong>of</strong> unsolicited e-mails (spamming) or scams.<br />

But evidence suggests that operators <strong>of</strong> botnets frequently sell their services to<br />

spammers, mailing out spam runs over thousands <strong>of</strong> infected computers that cannot be<br />

linked to the source. 138 These aspects are followed up below.<br />

136 Note that in the UK, as in many other countries, misappropriation <strong>of</strong> data or writing malicious s<strong>of</strong>tware does<br />

not constitute a civil crime but only its exploitation.<br />

137 Barroso, D. (2007), ENISA Position Paper No. 3; Botnets – The Silent Threat.<br />

138 Terrence Berg, (2007): Cybercrime new internet threats create challenges to law enforcement, Computer<br />

Law Journal, June 2007.<br />

Page 47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!