All the latest UK technology news, reviews and analysis


The year in security: Cybercrooks go head to head with state-sponsored hackers

31 Dec 2012
cyber-crime-illo

Security experts have long warned of the threat posed by state sponsored hackers and the hyper sophisticated malware they create.

However, it was only recently that anybody has really paid attention to the warnings, with the discovery of hyper sophisticated threats like Flame and Gauss causing panic across the globe.

This started several months ago when renowned voices in the industry like F-Secure's Mikko Hypponen and Microsoft Trustworthy Computing's Scott Charney issued reports claiming the world and its governments are currently in a cyber arms race.

For this reason, where the mad antics of groups and collectives like Anonymous and its splinter cell LulzSec led to 2011 being labelled the year of the hacktivist, sophisticated malware like Flame have seen 2012 being dubbed the year of the state-sponsored threat.

However, despite its widespread media coverage many security vendors have moved to downplay the overarching significance of these threats. Kaspersky Lab's security chief David Emm clarified that threats like Flame, while serious, are old problems.

"While Flame was the largest and most sophisticated of the cyber-espionage programs, its longevity was its most prominent characteristic," said Emm.

"Being at least a five-year-old project, Flame was an example of a complex malicious program that could exist undetected for an extended amount of time while collecting massive amounts of data and sensitive information from its victims."

Emm's sentiment was mirrored by F-Secure researcher Sean Sullivan, who highlighted the fact that threats like Flame and Gauss have been around for several years.

"I would quibble a bit with ‘emergence' theory, in that what has actually emerged is information about such software. The use of espionage tools such as Flame and Gauss started already before 2012, and the budgeting and development goes back to the Bush administration," Sullivan told V3.

 

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
23%
14%
4%
17%
30%
12%

Popular Threads

Powered by Disqus
Galaxy S5 vs iPhone 5S vs Nexus 5 showdown

Galaxy S5 vs iPhone 5S vs Nexus 5

We speed test three of the most popular smartphones

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Digital Project Manager - Creative Technology House

Digital Project Manager - Creative Technology House Henley...

SQL Database Adminstrator (DBA) SQL 2012, SSIS, Windows 2012

SQL Database Adminstrator (DBA) SQL 2012, SSIS, Windows...

SharePoint Lead Developer - SharePoint 2013, C#, .Net

SharePoint Lead Developer – SharePoint 2013, C#, .Net...

Infrastructure Analyst - Storage, SAN, EMC, VMWare, Exchange

Infrastructure Analyst - Storage, SAN, EMC, VMWare, Exchange...
To send to more than one email address, simply separate each address with a comma.