CYBER SNOOPING
There are too many malcontents in
the online world, and they spare neither governments not individuals.
Secret Invasion
Backdoor Ghostnet Trojan
Malware defender 2009 Misleading
Application
W32.Xanib.A Virus
W32.SillyFDC.BBM Worm
W32.Fidamag.A Virus
Bloodhound.PDF.9 Trojan, Virus, Worm
Unix.Psybot Worm
These are some of the malwares
which destroy online services all over the world. These are called 1] software,
2] spyware, 3] malware(malicious software)
These are first
observed by Canada IWM. It found out that a malware unleashed from four servers
in China had infiltrated 1295 computers containing confidential government data
in 103 countries. That malware is called gh0st RAT. It could monitor the text
files in the infected computer, but could also supposedly log keystrokes,
capture video and audio and do a host of other such things.
It is said that
many of the computers had been infected al most two years ago—and the malware
had remained undetected.
It pointed out
that it had been detected by IWM largely because the agency was looking for
something like it.
It may have
remained undetected for many years.
It is observed
that the malware is passing back information to four servers in China.
The Chinese
govt. denied that.
The main purpose
of this snooping mission is to keep an eye on what the Dalai Lama and other
exiled leaders of Tibet were doing. How those govt.s are helping them.
Some of the
nationalisitic Russians with good software skills had attacked online services
in 2007 and in 2008. They disrupted several services, including emergency ones.
They also could disrupt email or data to throw their operations out of gear.
Effects:-1. The hackers effected
the G-mai in Feb.2009. People could not access their accounts. Mails could not
be opened fast. Google could handle this situation.
2.
In the US and UK millions of consumers have face theft of their credit and
debit card data in the past few years from their safe sites.
3. State Bank of
India’s website was hacked.
Cyber terrorism
is evolving from guns and grenades to the internet. The hackers are breaking
into networks that control missiles or satellites.
In the civilian
realm, a hacker attack in a wired country can paralyse a] airport operations,
b] banking, c] dozens of other things –
in fact, almost anything that is connected to the Web.
How does it effect India:-
In
India common network is connecting all
its departments. Any thing can happen in a large scale any time.
It
enables the hackers to break into the National Informatics Centre network, most
ministries including Defence and Home.
Precautions:-
Computers
in India and globally have old hardware and software. These are the best to
hacking and spread virus. So the hard drive need to be changed periodically.
No comments:
Post a Comment