It’s plain old wishful thinking to assume that the capture of a malware administrator will do anything to slow the tide of cybercrime. Even the authorities who catch cybercriminals readily admit that a single arrest is just a small drop in the malicious bucket. If anything, the news of the recent arrest of an alleged major malware administrator only points to how impossibly vast the sphere of cybercrime truly is.
Authorities: Arrest of Man Behind Two Malicious Strains Will Not Stop Infections
Malware administrators are stealthy enough that they often avoid capture, so the arrest of one is always cause for a headline. When the criminal in question turns out to be an alleged administrator behind not one, but two of the most virulent malicious strains out there, that headline is bound to get a little more circulation.
Such has been the case with Evgeniy Mikhailovich Bogachev, a 30-year-old Russian man whose arrest and subsequent 14-count indictment has drawn global attention to the efforts of authorities to curb the spread of high-profile malicious strains, according to Dark Reading.
The U.S. Department of Justice reported that Bogachev was arrested following an extensive and global probe into two threats: GameoverZeuS, a botnet, and Cryptolocker, ransomware. Of these two, GOZeuS has been the one attracting more attention of late due to its sheer power.
“Gameover ZeuS is the most sophisticated botnet the FBI and our allies have ever attempted to disrupt,” said FBI Executive Assistant Director Robert Anderson, who was part of the investigation that led to Bogachev’s arrest.
What makes GOZeuS especially threatening is its ostensibly innocent presentation. According to Express, it often arrives in the form of an inconspicuous email attachment, only later wreaking havoc on computer systems.
But the simple fact that mitigates all celebration of Bogachev’s capture is the knowledge that his arrest will likely do nothing to prevent these two strains — let alone the cybercrime community in general — from chugging along at full speed.
To their credit, the authorities who carried out the investigation — which spanned law enforcement agencies across 11 countries — are the first to admit that their findings are unlikely to do much. At best, authorities say their work will result in a two-week disruption of GOZeuS infringements, which is still notable given that it will permit infected operations to rid themselves of the botnet.
But the authorities’ warning that a single arrest or investigation won’t suppress malware should be a wakeup call to businesses to firm up security.
Companies Need to Emphasize Enterprise Security as Central Part of Business Planning
The problem with enterprise security is that it’s often confined to the periphery of an organization, when the widespread nature of the attack sphere has clearly demonstrated that it should be a central concern.
In order to correct this, businesses need to afford security the centrality it deserves by bringing the topic to the attention of all employees, not just IT workers. In an age when attacks threaten every worker, it is imperative that all employees know what they need to do to protect both their professional identity and that of the company.