Navigation Links
Compromised US and Chinese Computers Launch Greatest Number of Cyber Attacks, According to SecureWorks' Data
Date:9/22/2008

Organizations and Individuals Need to Enhance Computer Security

ATLANTA, Sept. 22 /PRNewswire/ -- SecureWorks(R), one of the market's leading Security-as-a-Service (SaaS) providers, has published the locations of the computers, from which the greatest number of cyber attacks were attempted against its clients in 2008. The United States topped the list with 20.6 million attempted attacks originating from computers within the country and China ran second with 7.7 million attempted attacks emanating from computers within its borders.

This was followed by Brazil with over 166,987 attempted attacks, South Korea with 162,289, Poland with 153,205, Japan with 142,346, Russia with 130,572, Taiwan with 124,997, Germany with 110,493, and Canada with 107,483.

"We believe these statistics are significant because it clearly shows that the United States and China have a lot of vulnerable computers that have been compromised and are being used as bots to launch cyber attacks," said Hunter King, security researcher for SecureWorks. "This should be a warning to organizations and personal computer users that, not only are they putting their computers and networks at risk by not securing them, but they are actually providing these cyber criminals with a platform from which to compromise other computers."

Computer security can be greatly improved by keeping your web browser and operating system up to date, using the latest versions of antivirus and antispyware software, following safe computer practices such as being wary of the websites you visit, and not clicking on attachments and links within emails until verifying that the sender intentionally sent the enclosed link or attachment."

"These findings illustrate the ineffectiveness of simply blocking incoming communications from foreign IP addresses as a way to defend your organization from cyber attacks, as many hackers hijack computers outside their borders to attack their victims," said Don Jackson, Director of Threat Intelligence for SecureWorks. "The Georgia/Russia cyber conflict was a perfect example of this. Many of the Georgian IT staff members thought that by blocking Russian IP addresses they would be able to protect their networks, however, many of the Russian attacks were actually launched from IP addresses in Turkey and the United States so consequently they were hit hard. This was a perfect example where we saw Russian cyber criminals using compromised computers outside their borders."

"On the other hand, we have found that many of the Chinese hackers will compromise large networks within their own country and use them as bots to attack other organizations," continued Jackson. "For example, entire university networks in China will belong to local hacker groups."

"China's hackers do create botnets from spamming through email and blogs, but a relatively larger percentage of the compromised hosts under Chinese control are simply machines in schools, data centers, companies -- in other words, on large networks -- that are mostly unguarded and consequently are entirely controlled by hacker groups, as opposed to distributed bots harvested from widely distributed international spam runs, said Jackson. "And often the groups have an insider in the networks they own. We also see many local hacker groups in Japan and Poland compromise hosts within their own country to use in cyber attacks, so the Chinese hackers are not alone in using resources within their own borders."

With hackers utilizing computer resources inside and outside of their borders, SecureWorks suggests that in addition to securing computers with ongoing system and security updates and patches, organizations should utilize a black list to block inbound communications from known malicious IP addresses. Organizations should also block outbound communications to foreign countries known to harbor hackers and block outbound communications to hostile networks known to host criminal activity. This way if your organization does have an infected host within its network, then the host will be blocked from sending personal or company data to the cyber criminals. Of course, some of these hostile networks do support a handful of legitimate sites. In addition to a blacklist, your organization can use a separate whitelist to allow outbound communication only to trustworthy sites on those otherwise hostile networks.

"SecureWorks blocks attacks no matter what machines or countries they are coming from. When a machine represents a clear and present danger our Security Operations Center and technology might decide to block all traffic from that machine forcing the criminals to be constantly finding new machines to attack from," said Jon Ramsey, SecureWorks' CTO.

About SecureWorks

With over 2,000 clients, SecureWorks is one of the market's leading Security as a Service providers. Organizations are protected from external and internal cyber-threats through SecureWorks' On-Demand Security Information and Event Management (SIEM) platform, the SecureWorks Counter Threat Unit(TM) and three fully synchronous Security Operations Centers (SOCs) staffed with SANS GIAC certified analysts working 24x7 to safeguard client systems. SecureWorks has won SC Magazine's "Best Managed Security Service" award for 2006, 2007 & 2008, Best Intrusion Prevention 2006 and has been named to the Inc 500 and Deloitte lists of fastest-growing companies. http://www.secureworks.com .


'/>"/>
SOURCE SecureWorks
Copyright©2008 PR Newswire.
All rights reserved

Related medicine news :

1. St. Jude finds risk factors for severe RSV infection in immunocompromised children
2. St. Jude Finds Risk Factors for Severe RSV Infection in Immunocompromised Children
3. High alcohol consumption increases stroke risk among Chinese men
4. Heavy Drinking Boosts Stroke Risk for Chinese Men
5. China Shenghuo Pharmaceutical Holdings, Inc. Begins Full-Scale Launch of 12Ways(R) Chinese Herbal Skin Care Product Line
6. Chinese takeaway in the Wadden Sea
7. A Chinese medicine compound has satisfactory anti-cancer effects on hepatocellular carcinoma
8. China Shenghuo Pharmaceutical Holdings, Inc. Opens Showcase 12Ways(R) Chinese Herbal Beauty Salon in October
9. CHRI Receives Approval for Suining Chuan DAR Authentication Trademark From Chinese Government
10. All-State Properties, L.P. Announces Termination of Reverse Merger With Chinese Pharmaceutical Company
11. Rh-Apo2L Named as One of Chinas High-Tech Transforming Products by Chinese Government
Post Your Comments:
*Name:
*Comment:
*Email:
(Date:5/28/2016)... ... 2016 , ... After a year and a half of planning the Multiple Pathways of ... Multiple Pathways of Recovery Conference was held May 2 -4, 2016 at the Mystic ... came together to explore the many pathways individuals use to get into and sustain their ...
(Date:5/27/2016)... ... May 27, 2016 , ... Two director-level employees of Horizon Blue Cross Blue ... Industry (TWIN) 2016 honorees. The award recognizes businesswomen who excel in their fields ... Director of the MLTSS (Managed Long-Term Services and Supports) Program at Horizon NJ Health ...
(Date:5/27/2016)... ... , ... This campaign aims to provide a path to improved education and ... and change. , As nearly 795,000 Americans suffering from a new or recurrent stoke ... with an estimated 129,000 of these people dying from stroke, it’s become our nation’s ...
(Date:5/27/2016)... ... 27, 2016 , ... Aimed at nurses and employees in ... courtesy of leaders in the nursing and health care industry. It also provides ... and associations—namely Jones & Bartlett Learning. , Jones & Bartlett Learning is adding ...
(Date:5/26/2016)... ... ... Despite last week’s media reports hinting at a June rate hike after the ... for an interest rate increase, according to Rajeev Dhawan of the Economic Forecasting Center ... Market Committee (FOMC) dot charts are of interest to the press for their noise ...
Breaking Medicine News(10 mins):
(Date:5/27/2016)... PUNE, India , May 27, 2016 ... in the instances of hypertension is driving ambulatory blood ... muscles lose their elasticity and their ability to respond ... blood pressure. This condition can lead to various cardiovascular ... and peripheral vascular disease. These diseases are growing in ...
(Date:5/26/2016)... , May 26, 2016 According ... "Medical Waste Management Market - U.S. Industry Analysis, Size, Share, ... management market in the U.S. was valued at US$ 5.89 ... CAGR of 3.4% from 2015 to 2023 to reach US$ ... analysis of current and emerging needle free drug delivery devices ...
(Date:5/25/2016)... May 25,2016 FDA 510(k) ... Cellvizio platform for urological and surgical applications ... inventor of Cellvizio®, the multidisciplinary confocal laser endomicroscopy ... in the US with the 12 th ... Administration (FDA). This new FDA clearance covers Confocal ...
Breaking Medicine Technology: