ITU Home Page International Telecommunication Union Français | Español 
Print Version 
ITU Home Page
Home : Office of the Secretary-General : SPU : Cybersecurity

ITU Global Cybersecurity Agenda

Framework for International Cooperation in Cybersecurity

Home

The Constant Evolution of the Nature of Cyberthreats 

Cyberthreats have become increasingly sophisticated since the early 1980s, when the first known case of a computer virus was reported. As recently as a few years ago, the development of malware (including viruses, worms, and Trojans) presented a simple intellectual challenge to information technology (IT) experts to demonstrate the technical skills. Today, cybercrime has become an organized syndicate reaping financial rewards and using diverse tools to threaten different platforms in various countries. No country is safe. Spam has evolved to become a vehicle disseminating other dangerous malware to perpetrate online financial fraud, identity or trade-secret theft, among other risks.

Taking into account newer threats to critical infrastructure in the financial, health, energy, transportation, telecommunication, defence and other sectors, the impact of cyberthreats is becoming ever greater. Further, the risks are evolving in line with the technologies. For example, one emerging menace is the shift in strategy by hackers from a central command-and-control model for controlling botnets to a peer-to-peer model with a distributed command structure, capable of spreading to compromised computers located in different countries. This practice makes it very difficult to pinpoint any single geographical location as the origin of cyberattacks using botnets, and consequently makes it more difficult to identify them and shut them down. This shift in strategy is not just aimed at delivering courier spam and malware, but can also be used to disseminate inappropriate content, such as child pornography, without the knowledge of the hijacked computer owners that they are hosting and disseminating such content.

Lower entry barriers and increasing sophistication of cybercrime

Toolkits and applications for phishing, spam, malware, scareware and snoopware can today be acquired relatively easily from underground sites or even purchased legally, lowering the financial and intellectual entry barriers to acquire tools to facilitate unauthorized access to information and communication systems to manipulate or destroy them.

Snoopware is going mobile, threatening user privacy through the possibility of voice/data call monitoring with devastating consequences, especially for the growing number of corporate users who rely on their smartphones for confidential discussions and data exchanges with their corporate IT systems. With the phenomenal growth in mobile telephony (including smartphones), together with convergence, which is bringing down the walls between networks, cyberthreats can now spread easily to all platforms and to all countries .

As information technology becomes an ever greater part of our lives, and as ubiquitous connections to the Internet become a reality, with computers integrated into a growing number of household appliances, it is increasingly likely that cyberthreats will spread to new levels and affect us in ways unimaginable today.
 

Top of page

ITU News Archive 

 

Top -  Feedback -  Contact Us -  Copyright © ITU 2007 All Rights Reserved
Contact for this page : Strategy and Policy Unit
Updated : 2007-07-12