International Telecommunication Union   ITU
عربي  |  中文  |  Español  |  Français  |  Русский
 
 Advanced Search Advanced Search Site Map Contact us Print Version
 
Home : Office of the Secretary-General : Corporate Strategy Division : Global Cybersecurity Agenda
   
The Changing Nature of Cyberthreats

Cyberthreats have become increasingly sophisticated since the early 1980s, when the first known case of a computer virus was reported. As recently as a few years ago, the development of malware (including viruses, worms, and Trojans) presented a simple intellectual challenge to information technology (IT) experts to demonstrate the technical skills. Today, cybercrime has become an organized syndicate reaping financial rewards and using diverse tools to threaten different platforms in various countries. No country is safe. Spam has evolved to become a vehicle disseminating other dangerous malware to perpetrate online financial fraud, identity or trade-secret theft, among other risks. Taking into account newer threats to critical infrastructure in the financial, health, energy, transportation, telecommunication, defence and other sectors, the impact of cyberthreats is becoming ever greater. Further, the risks are evolving in line with the technologies. For example, one emerging menace is the shift in strategy by hackers from a central command-and-control model for controlling botnets to a peer-to-peer model with a distributed command structure, capable of spreading to compromised computers located in different countries. This practice makes it very difficult to pinpoint any single geographical location as the origin of cyberattacks using botnets, and consequently makes it more difficult to identify them and shut them down. This shift in strategy is not just aimed at delivering courier spam and malware, but can also be used to disseminate inappropriate content, such as child pornography, without the knowledge of the hijacked computer owners that they are hosting and disseminating such content.
 

« Go back to overview

 

Top - Feedback - Contact Us -  Copyright © ITU 2009 All Rights Reserved
Contact for this page : Corporate Strategy Division
Updated : 2008-05-09