All the latest UK technology news, reviews and analysis

Eastern European hackers posing bigger threat than Asian cyber crooks

19 Sep 2012
Concept image of a cyber criminal

Businesses should be far more concerned about Eastern European hackers for hire than Asian cyber snoops, according to security firm Trend Micro.

Trend Micro warned that European mercenary hackers are currently mounting far more sophisticated campaigns and attacks that their East Asian counterparts in a report entitled: Peter the Great vs Sun Tzu.

The report highlighted a significant disparity in the two regions hacker methodologies.

"The Eastern European custom-written, carefully crafted tools are designed for very specific attacks," Trend Micro security director Rik Ferguson told V3.

"Asian teams use more off the shelf stuff, things like Spyeye, Zeus, exploit kits. They go after targets that aren't bulletproof and are more widespread."

Ferguson highlighted the importance of reputation among Eastern bloc hackers as a key reason for the difference.

"You're only as good as your last hack. If a known gang gets defaced or hacked it translates into brand damage and could put the crew out of business," said Ferguson.

"Asian teams are backed, they have sponsors. This means they're larger and if things go wrong its the project not the team that is damaged."

The news follows widespread warnings within the security industry that hackers are developing new and more dangerous attacks.

FireEye issued its own report suggesting the majority of UK firms' networks have already been breached by hackers.

For more insight into some of the major security issues affecting businesses make sure you sign up to the V3 Security Summit taking place on Tuesday 25 September which includes high-level speakers such as Nathaniel Borenstein and Bruce Schneier and Rik Ferguson.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?

Popular Threads

Powered by Disqus
Sony Xperia Z2 Tablet powered by Android KitKat 4.4

Sony Xperia Z2 Tablet video

We take a look at the lightweight, waterproof tablet

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Litigation eDiscovery Analyst (DocuMatrix, Relativity, Introspect)

Litigation eDiscovery Analyst (DocuMatrix, Relativity...

C# .NET Developer (SQL, Algorithms, Data Algorithms, Artificial

C# .NET Developer (SQL, Algorithms, Data Algorithms...

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

Retail and Finance Application Developer and Support Analyst

MS Dynamics Nav: Retail and Finance Application Developer...
To send to more than one email address, simply separate each address with a comma.