10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

to different groups <strong>of</strong> criminals for different purposes. The rapid evolution <strong>of</strong> the Storm<br />

Worm gang has turned into an Internet Service Providers (ISP) for cybercriminals [chain<br />

upgrading]. 163<br />

Sources: Ian Grant (14 th Feb 2008): Storm Worm is basis for most cyber attacks,<br />

Computer weekly.com/ Bruce Schneier (10 th April 2007): Gathering 'Storm' Superworm<br />

Poses Grave Threat to PC Nets, Wired.com/ Sorensen, Chris (15 th October 2007). "Storm<br />

Worm the 'syphilis' <strong>of</strong> computers", The Star. Retrieved on 17 October 2007. / Symantec<br />

(2008) Evolved Storm Worm attack brewing/ Pedro Hernandez (5 th April 2008)<br />

MessageLabs: Storm Botnet Spews 20 Percent <strong>of</strong> All Spam, eSecurityplanet.com.<br />

Process upgrading. This type <strong>of</strong> upgrading manifests itself in increases in the efficiency<br />

<strong>of</strong> internal processes such that these are significantly better than those <strong>of</strong> rivals. Process<br />

upgrading can take place within individual links in the chain and between the links in the<br />

chain. 164 The cybercrime industry is replete with examples including the dynamics <strong>of</strong><br />

botnets. The two main goals <strong>of</strong> a botnet can be summarised as infecting as many users<br />

as possible through the use <strong>of</strong> new propagation techniques and increasing stealth. These<br />

two factors drive process upgrading in cybercrime in general but are particularly<br />

applicable to botnets. In the Storm botnet (see box), attackers have become more<br />

cautious and sophisticated in their process <strong>of</strong> distribution and delivery, constantly<br />

upgrading their camouflage techniques to avoid detection, as reflected in the<br />

development <strong>of</strong> fast-flux.<br />

Product upgrading. This refers to the ability to introduce new or improved products<br />

faster than rivals. This involves changing new product development processes both<br />

within individual links in the value chain and in the relationship between different chain<br />

links. 165 Highly sophisticated crimeware is constantly evolving in complexity and<br />

163 Paul Wood, a Senior Security Analyst for MessageLabs said in April 2008: "The way in which the Storm<br />

botnet has evolved from its dawn in 2007 has placed it head-and-shoulders above many other operators in this<br />

market. i.e. the market <strong>of</strong> creating and hiring-out botnet airtime to spammers and other online criminals,"<br />

They have basically become an Internet Service Providers (ISP) for cybercriminals<br />

164 Kaplinsky R, and Morris M., (2001), A Handbook for Value Chain Research. International Development<br />

Research Centre: Ottawa.<br />

165 Kaplinsky R, and Morris M., (2001), A Handbook for Value Chain Research. International Development<br />

Research Centre: Ottawa.<br />

Page 56

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!