Researcher wants hacker groups hounded mercilessly
Botnet expert Joe Stewart says 'special ops' teams could thwart cybercriminals
Computerworld - Criminal cybergangs must be harried, hounded and hunted until they're driven out of business, a noted botnet researcher said today as he prepared to pitch a new anti-malware strategy later this week at the RSA Conference in San Francisco.
"We need a new approach to fighting cybercrime," said Joe Stewart, director of SecureWorks Inc.'s counterthreat unit. "What we're doing now is not making a significant dent."
Rather than pursue malware makers the old-fashioned way -- a tack Stewart argued is haphazard, at best -- he said that teams of paid security researchers should be created to stalk and disrupt specific criminal gangs or botnets. Set up like a police department's major crimes unit or a military special operations team, the researchers would take a long-term view, get to know their target, perhaps even infiltrate the group responsible for the botnet and employ a spectrum of disruptive tactics.
"Criminals are operating with the same risk-effort-reward model of legitimate businesses," said Stewart. "If we really want to dissuade them, we have to attack all three of those. Only then can we disrupt their business."
Researchers have had some success, said Stewart, who cited last November's takedown of McColo Corp., a hosting company that was harboring the command-and-control servers for several large botnets, as an one example. The creation of the Conficker Working Group, a consortium of companies and organizations that has worked to keep that worm's makers from communicating with infected PCs, is another.
"McColo didn't take all the botnets out," said Stewart, who was instrumental in identifying the botnets controlled by McColo-hosted systems, "even though some, like Srizbi, suffered. But even though Srizbi didn't really come back, [its authors] are back up and running another bot. It's much less sophisticated, and just one-tenth the size, but they're back."
To affect a botnet, and the criminal group behind it, Stewart believes that small, independent teams must focus on just that one malware family. "These small groups would have a long-term focus on just one criminal group or botnet, and employ every tactic that they can come up with," he said.
Current tactics, such as taking down a command-and-control server or building spam filtering lists, are not enough, Stewart argued. "We need to keep doing them, over and over again," he said.
A purely volunteer effort won't cut it, he's convinced, and some way to fund professionals must be found. "Maybe a bank or group of banks would fund a team that goes after a phishing group or banking Trojan groups," Stewart speculated. But he acknowledged he doesn't have all the answers. "I'm more of an idea guy."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts