NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
to different groups <strong>of</strong> criminals for different purposes. The rapid evolution <strong>of</strong> the Storm<br />
Worm gang has turned into an Internet Service Providers (ISP) for cybercriminals [chain<br />
upgrading]. 163<br />
Sources: Ian Grant (14 th Feb 2008): Storm Worm is basis for most cyber attacks,<br />
Computer weekly.com/ Bruce Schneier (10 th April 2007): Gathering 'Storm' Superworm<br />
Poses Grave Threat to PC Nets, Wired.com/ Sorensen, Chris (15 th October 2007). "Storm<br />
Worm the 'syphilis' <strong>of</strong> computers", The Star. Retrieved on 17 October 2007. / Symantec<br />
(2008) Evolved Storm Worm attack brewing/ Pedro Hernandez (5 th April 2008)<br />
MessageLabs: Storm Botnet Spews 20 Percent <strong>of</strong> All Spam, eSecurityplanet.com.<br />
Process upgrading. This type <strong>of</strong> upgrading manifests itself in increases in the efficiency<br />
<strong>of</strong> internal processes such that these are significantly better than those <strong>of</strong> rivals. Process<br />
upgrading can take place within individual links in the chain and between the links in the<br />
chain. 164 The cybercrime industry is replete with examples including the dynamics <strong>of</strong><br />
botnets. The two main goals <strong>of</strong> a botnet can be summarised as infecting as many users<br />
as possible through the use <strong>of</strong> new propagation techniques and increasing stealth. These<br />
two factors drive process upgrading in cybercrime in general but are particularly<br />
applicable to botnets. In the Storm botnet (see box), attackers have become more<br />
cautious and sophisticated in their process <strong>of</strong> distribution and delivery, constantly<br />
upgrading their camouflage techniques to avoid detection, as reflected in the<br />
development <strong>of</strong> fast-flux.<br />
Product upgrading. This refers to the ability to introduce new or improved products<br />
faster than rivals. This involves changing new product development processes both<br />
within individual links in the value chain and in the relationship between different chain<br />
links. 165 Highly sophisticated crimeware is constantly evolving in complexity and<br />
163 Paul Wood, a Senior Security Analyst for MessageLabs said in April 2008: "The way in which the Storm<br />
botnet has evolved from its dawn in 2007 has placed it head-and-shoulders above many other operators in this<br />
market. i.e. the market <strong>of</strong> creating and hiring-out botnet airtime to spammers and other online criminals,"<br />
They have basically become an Internet Service Providers (ISP) for cybercriminals<br />
164 Kaplinsky R, and Morris M., (2001), A Handbook for Value Chain Research. International Development<br />
Research Centre: Ottawa.<br />
165 Kaplinsky R, and Morris M., (2001), A Handbook for Value Chain Research. International Development<br />
Research Centre: Ottawa.<br />
Page 56