Being connected to the Internet today, the question one must ask is not whether I will be hacked, but more about when I will be hacked. That said, according to Verizon's 2013 Data Breach Investigation Report, 92 percent of all breaches analyzed and participated in were committed by parties outside the compromised network. In addition to this statistic, 40% of breaches incorporated some form of malware and 52% used some form of hacking, both of which they say represent a decrease of at least 10% from the previous year (Verizon Risk Team , 2013). While these numbers have decreased, there is no definitive data to say whether this is due to an increase in the technology's ability to detect and prevent or whether the end user is becoming more educated or a combination of the two. Malware, short for malicious software, as mentioned above, still accounts for around 40% of breaches detected and intercepted. Coreflood has undergone multiple iterations and evolved over its lifetime, starting as an IRC (Internet Relay Chat) botnet and evolving into a trojan capable of stealing keystrokes, data, and other which you may find important. Although Coreflood poses no major danger today, as the US Department of Justice and FBI have replaced malicious command and control (C2) servers with government-controlled systems, it had a large effect on computers in its day. 'gold. As data from Computerworld and the FBI showed, Coreflood was receiving up to 800,000 beacons per day on C2 servers. Figure 1: Data: "2011 Computer World", Keizer To start with a brief history and terminology, Coreflood is a derivative of the AFcore Trojan that originated ba...... middle of paper .......aspxSecurelist . Backdoor.Win32.Afcore.q. Retrieved from http://www.securelist.com/en/descriptions/90272/Backdoor.Win32.Afcore.qStewart, J. (2008). The Coreflood report. Retrieved from: http://www.secureworks.com/cyber-threat-intelligence/threats/coreflood-report/Verizon Risk Team (2013). 2013 Data Breach Investigation Report. Retrieved from: http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdfWarner, G. (2008). Russian Cybercrooks, Coreflood and the amazing Joe Stewart. Retrieved from: http://garwarner.blogspot.com/2008/07/russian-cybercrooks-coreflood-and.htmlWikipedia. Botnets. Retrieved from: http://en.wikipedia.org/wiki/BotnetUnited States District Court District of Connecticut. (2011). United States vs. JOHN DOE 1-13. Retrieved from: http://www.fbi.gov/newhaven/press-releases/pdf/nh041311_4.pdf
tags