Internet Crimes Viruses

There are many crimes on the internet such as; data stealing, fraud, carding illegal, identity stealing (phising), kidding, web-spoofing/deface, software piracy, SQL injection, and the attack of worm, virus, Trojan horse etc.

Most of dangers are starting from the Malware accessing. This software destroyer can be formed of worm, virus, spy-ware, probably Adware. Particularly Adware can be classified into Malware group or does not depend on who accesses it. Adware on the internet is felt uncomfortable by several users but for the others users’ opinion it is a kind of normal advertising. Adware comes pop-up on our screen when we use/access a certain site/blog-spot.

Source: cherry blossoms

The recent news said, that Federal Tread Commission (FTC) in USA helped Adware company to get the business license or it can be erased from the kind of business. But on the same occasion this commission has not resolved yet to avoid the cyber crime in the internet. The crime menacing on the internet based on the experts’ opinion such as Symantec and McAfee. The crime menacing will develop quickly especially for the popular of system operation and application. As we know, the worm and virus is easer infiltrate the weak of system space. Symantec stated that the Vista system operation had 16-19 weak of vulnerable systems.

This amount is not surprise. At beginning of 2003, the writer got 15 weak of system spaces on Window Server 2003 of Enterprise Edition. This case happened when the Worm MSN-last infiltrated the system operation that had not been patched yet. One of the patch is remote-code execution where the writer’s system operation is accessed remotely from the special server of Indosat.

In general, this system spaces can cause the data streaming on real time at Stock Screening from the BEJ to Computer Server but the computer stopped for three days. It is not only famous system operation such as Windows that became a target of worm maker. At the same year, the writer also found the problems such as the IBM Z/OS and Red-Hat Linux 9 system operation is detected that has 70-72 weak of security holes.

In case this shows that the worm virus maker does not discriminate the special product of open source or property. The author has been experience, beside of system operation, the MS-SQL, Out Look etc. also become their target. The destruction of our application system is caused by an un-updating MS-SQL that has the weak of system spaces. In the end, the writer can avoid the virus’ attack after he has patched on the operation system, application of data basis while up dates the anti virus software and anti- malware.

The magazine of Information Week wrote after system operation was game on-line sites. This attack was proven by the Cracker that always regard with money matter including the Hacker. Especially in 2007, the bigger walware attack at USA was dominated by Worm Strom. Although USA in this case was only an example, internet was not limited access of zone and time. The worm Botnet was also enough effective to attack the Asia including Indonesia. Not less of opinion, if the Strom virus was created by European (out of Russian) who did not like American where the maker of the virus was identified know the American’s culture.


Political Cyber Crime

The crime attack regards with the district political and nation economic also happened between China and America. On 19 November, Information Week as the weekly magazine wrote that the United State-China Economic and Security Review Commission said that China was observing to get the economization of time and money of research and developing the sophisticated technology that had been being developed.

Espionage where done by the Chinese is one of higher menacing for American’s technology. Besides, this commission also stated that his attention to China’s military capability on destroying the satellite to attack cyber to against American’s computer net-working and Security Cyber System.

This organized attack has been spread since 2005. As defense, this report suggested a funding that supported export control, especially to identify and avoid transfer of technology illegally to China. Besides, Cyber war between America and China, is also Malaysia-Indonesia. Recently we witnessed the war between Indonesian and Malaysian. But this war was only indignity on forum, blog and web-spoofing.

The Worm Strom; in the single form, this worm had been tested develop progressively. Network World, Inc., is a research company and technology media and also one of IDG division wrote that the Storm is the most productive worm. In one time, a PC visited the infected web-site then down loaded it, this PC would be infected by viruses. Thus, PC would be controlled automatically by the foreign user without the owner’s consciousness. In the same time, this PC would make a Bonet that could be used for sending the spam, attacking distributed DOS (Denial-of-service), or a mother site web would down load many malware again.

As we know, Bonet is a maker of Zombie networking. This was admitted by Adi Maulana, he is an expert of net working and security in the private company, Jakarta. Regarding on his experience, he suggested that the company needed to have the technician of Technology Information to keep on guard the worm virus that would attack the accompany system.

This worm is usually infiltrates the network and running system on sending the order, as the result, the empty network traffic becomes full. This case will make the company network of branch will be cut.

Ability of this worm virus in influencing the system is caused by its modern coding technique where it can suspect the hidden canal. The suspect way of this virus is different from the traditional virus or worm which can erase the certain data or file. Where this Strom virus installs its self on the FC through the spam (which is not brought by the massage or e-mail) but this virus infiltrates the system through users access the Malwar’s infected sites.

Ten Threatens

According to Anti-Virus Symantec Company, there are ten threatens dangerous. Firstly is a data stealing. Second is Vista operation system attack. Third is a spam that has developed progressively in middle-year of 2007. Fourth is a virus attacks the site of transaction online. Fifth is an identity stealing (phishing). Sixth is exploiting the famous brand. Seventh is a Bot. Eighth is the weak of system spaces web. Ninth the weak of security system such as: security maker, WabiSabiLabi as the informer who always convinces the buyer to get the information of the weakness of security system. Tenth is the Virtual machine security. This menace web-based will be priority used by the users because they use the same way and respond a script, such as: Java Script. Thus, creating the Malware will depend on the users as the example is SANS (Sys Admin, Audit, Network, Security) institute. Regarding on statement of an organization of research and education in USA said that there were hundred of domains in internet (approximately 40 thousand pages) had been taken over by a site maker The way of this mass deface is where the site maker injected the script-tag for 40 thousand pages web of domains. The script-tag or order-line is one of the XSS code (crossing-site scripting) which has the correlation between files of Java Script on a certain web.

The crime menace above can not be avoided only with the arrester product and a court. More complex and smartest of virus’s attack on the system is more needed the hard combination between security and management system. Why do not company clarify what really happen to the public?, if the crime victim of this virus attack them, they argued that this regarding to credibility problem. (, November 29, 2007)

Siti Nur Aryani

IT Consultant Aufklarung C&P:

Application Provider for Global Market


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s