- V3 Apps
Cyber crooks are increasingly using botnets, exploits and banking Trojans to make money, according to Finnish security firm F-Secure.
F-Secure reported detecting marked increase in the use of the three attack types in the second half of 2012 in its H2 Threat Report on Tuesday.
"Three things visibly stand out in this past half year: botnets (with special reference to ZeroAccess), exploits (particularly against the Java development platform) and banking Trojans (Zeus)," the report warned.
F-Secure claimed the ZeroAccess success was systematic of its ability to generate income using a variety of means in highly profitable territories.
"Of all the botnets we saw this year, definitely the fastest growing one was ZeroAccess, which racked up millions of infections globally in 2012, with up to 140,000 unique IPs in the US and Europe," read the report.
The report highlighted click fraud and Bitcoin mining as the botnet's primary means of income.
"The ZeroAccess botnet reportedly clicks 140 million ads a day. As this is essentially click fraud, it has been estimated that the botnet is costing up to $900,000 of daily revenue loss to legitimate online advertisers," read the report.
"Bitcoin miners harness the computational power from the bots to perform complex calculations to find a missing block to verify Bitcoin transactions and that would reward them in more Bitcoin currency that is agreed within the same peer to peer network, and these can be converted to cash."
F-Secure security researcher Sean Sullivan, claimed that the botnet's prevalence could be systematic of the fact that its main victim isn't the infected machine's user.
"ZeroAcess is a click-fraud botnet. It's actually quite difficult to get real folks concerned about it as a threat. I've spoken with support people and if it isn't a banking Trojan consumers don't actually feel like something tangible is at risk," said Sullivan.
"Ad-fraud is not a "victimless" crime, but it is very intangible and the whole ZeroAcess botnet is well designed to take advantage of the situation."
As well as ZeroAccess the report also detected increased activity by the Carberp, Dorkbot and SpamSoldier botnets.