Navigation Links
Compromised US and Chinese Computers Launch Greatest Number of Cyber Attacks, According to SecureWorks' Data

Organizations and Individuals Need to Enhance Computer Security

ATLANTA, Sept. 22 /PRNewswire/ -- SecureWorks(R), one of the market's leading Security-as-a-Service (SaaS) providers, has published the locations of the computers, from which the greatest number of cyber attacks were attempted against its clients in 2008. The United States topped the list with 20.6 million attempted attacks originating from computers within the country and China ran second with 7.7 million attempted attacks emanating from computers within its borders.

This was followed by Brazil with over 166,987 attempted attacks, South Korea with 162,289, Poland with 153,205, Japan with 142,346, Russia with 130,572, Taiwan with 124,997, Germany with 110,493, and Canada with 107,483.

"We believe these statistics are significant because it clearly shows that the United States and China have a lot of vulnerable computers that have been compromised and are being used as bots to launch cyber attacks," said Hunter King, security researcher for SecureWorks. "This should be a warning to organizations and personal computer users that, not only are they putting their computers and networks at risk by not securing them, but they are actually providing these cyber criminals with a platform from which to compromise other computers."

Computer security can be greatly improved by keeping your web browser and operating system up to date, using the latest versions of antivirus and antispyware software, following safe computer practices such as being wary of the websites you visit, and not clicking on attachments and links within emails until verifying that the sender intentionally sent the enclosed link or attachment."

"These findings illustrate the ineffectiveness of simply blocking incoming communications from foreign IP addresses as a way to defend your organization from cyber attacks, as many hackers hijack computers outside their borders to attack their victims," said Don Jackson, Director of Threat Intelligence for SecureWorks. "The Georgia/Russia cyber conflict was a perfect example of this. Many of the Georgian IT staff members thought that by blocking Russian IP addresses they would be able to protect their networks, however, many of the Russian attacks were actually launched from IP addresses in Turkey and the United States so consequently they were hit hard. This was a perfect example where we saw Russian cyber criminals using compromised computers outside their borders."

"On the other hand, we have found that many of the Chinese hackers will compromise large networks within their own country and use them as bots to attack other organizations," continued Jackson. "For example, entire university networks in China will belong to local hacker groups."

"China's hackers do create botnets from spamming through email and blogs, but a relatively larger percentage of the compromised hosts under Chinese control are simply machines in schools, data centers, companies -- in other words, on large networks -- that are mostly unguarded and consequently are entirely controlled by hacker groups, as opposed to distributed bots harvested from widely distributed international spam runs, said Jackson. "And often the groups have an insider in the networks they own. We also see many local hacker groups in Japan and Poland compromise hosts within their own country to use in cyber attacks, so the Chinese hackers are not alone in using resources within their own borders."

With hackers utilizing computer resources inside and outside of their borders, SecureWorks suggests that in addition to securing computers with ongoing system and security updates and patches, organizations should utilize a black list to block inbound communications from known malicious IP addresses. Organizations should also block outbound communications to foreign countries known to harbor hackers and block outbound communications to hostile networks known to host criminal activity. This way if your organization does have an infected host within its network, then the host will be blocked from sending personal or company data to the cyber criminals. Of course, some of these hostile networks do support a handful of legitimate sites. In addition to a blacklist, your organization can use a separate whitelist to allow outbound communication only to trustworthy sites on those otherwise hostile networks.

"SecureWorks blocks attacks no matter what machines or countries they are coming from. When a machine represents a clear and present danger our Security Operations Center and technology might decide to block all traffic from that machine forcing the criminals to be constantly finding new machines to attack from," said Jon Ramsey, SecureWorks' CTO.

About SecureWorks

With over 2,000 clients, SecureWorks is one of the market's leading Security as a Service providers. Organizations are protected from external and internal cyber-threats through SecureWorks' On-Demand Security Information and Event Management (SIEM) platform, the SecureWorks Counter Threat Unit(TM) and three fully synchronous Security Operations Centers (SOCs) staffed with SANS GIAC certified analysts working 24x7 to safeguard client systems. SecureWorks has won SC Magazine's "Best Managed Security Service" award for 2006, 2007 & 2008, Best Intrusion Prevention 2006 and has been named to the Inc 500 and Deloitte lists of fastest-growing companies. .

SOURCE SecureWorks
Copyright©2008 PR Newswire.
All rights reserved

Related medicine news :

1. St. Jude finds risk factors for severe RSV infection in immunocompromised children
2. St. Jude Finds Risk Factors for Severe RSV Infection in Immunocompromised Children
3. High alcohol consumption increases stroke risk among Chinese men
4. Heavy Drinking Boosts Stroke Risk for Chinese Men
5. China Shenghuo Pharmaceutical Holdings, Inc. Begins Full-Scale Launch of 12Ways(R) Chinese Herbal Skin Care Product Line
6. Chinese takeaway in the Wadden Sea
7. A Chinese medicine compound has satisfactory anti-cancer effects on hepatocellular carcinoma
8. China Shenghuo Pharmaceutical Holdings, Inc. Opens Showcase 12Ways(R) Chinese Herbal Beauty Salon in October
9. CHRI Receives Approval for Suining Chuan DAR Authentication Trademark From Chinese Government
10. All-State Properties, L.P. Announces Termination of Reverse Merger With Chinese Pharmaceutical Company
11. Rh-Apo2L Named as One of Chinas High-Tech Transforming Products by Chinese Government
Post Your Comments:
(Date:6/26/2016)... ... June 26, 2016 , ... Brent Kasmer, a legally blind and certified personal trainer is helping ... fitness app. The fitness app plans to fix the two major problems leading the fitness ... size fits all type program , They don’t eliminate all the reasons people ...
(Date:6/25/2016)... ... 25, 2016 , ... Austin residents seeking Mohs surgery services, can now turn ... to Dr. Russell Peckham for medical and surgical dermatology. , Dr. Dorsey brings specialization ... selective fellowship in Mohs Micrographic Surgery completed by Dr. Dorsey was under the direction ...
(Date:6/25/2016)... , ... June 25, 2016 , ... First Choice ... States, named Dr. Sesan Ogunleye, as the Medical Director of its new Mesquite-Samuell Farm ... Medical Director of our new Mesquite location,” said Dr. James M. Muzzarelli, Executive Medical ...
(Date:6/25/2016)... ... June 25, 2016 , ... On Friday, June 10, Van Mitchell, Secretary of ... award to iHire in recognition of their exemplary accomplishments in worksite health promotion. , ... Workplace Health & Wellness Symposium at the BWI Marriott in Linthicum Heights. iHire was ...
(Date:6/24/2016)... ... ... Those who have experienced traumatic events may suffer from a complex set ... drug or alcohol abuse, as a coping mechanism. To avoid this pain and suffering, ... traumatic event. , Trauma sufferers tend to feel a range of emotions, from depression, ...
Breaking Medicine News(10 mins):
(Date:6/24/2016)... CHAPEL HILL, N.C. , June 24, 2016 ... in healthcare decisions and regulators/payers have placed more ... this new environment, patient support programs in the ... support for patients, medications. Consequently, pharmaceutical companies are ... to ensure they are providing products and services ...
(Date:6/24/2016)... DUBLIN , June 24, 2016 ... and Markets has announced the addition of the ... their offering. ... products and provides an updated review, including its applications ... covering the total market, which includes three main industries: ...
(Date:6/24/2016)... ANDOVER, Mass. and SAN CLEMENTE, Calif. ... California -based mobile pulmonary function testing company, is now ... portable PFT devices developed by ndd Medical Technologies , Inc. ... PFT testing done in hospital-based labs.  Thanks to ndd,s EasyOne PRO ... CA , can get any needed testing done in the ...
Breaking Medicine Technology: