Computer Hackers and Greed

1873 Words4 Pages

Multi-platform computer worms are a tool that computer hackers use to infect computers to gain control access. Computer worms are a dangerous virus because they are self-replicating, meaning that they multiply themselves and spread onto other computer networks seeking a lapse in internet security. Computer worms do not need to attach themselves onto an existing computer program to gain access to the victim computer files. The computer worm was created on accident by a Cornell student named Robert Morris; he was seeking a way of managing the internet in 1988. “Morris had no malicious intent, but a bug in his program caused many of the computers the worm landed on to crash. … but worms had come of age and have since evolved into an effective way of attacking systems connected to the internet” (Barwise). Today, hackers use the Morris worm to infect computers. “Five men believed to be responsible for spreading a notorious computer worm on Facebook and other social networks — and pocketing several million dollars from online schemes — are hiding in plain sight in St. Petersburg, Russia …” (Richmond). Since the good intended creation of the worm it has only been used maliciously as a computer virus by money seeking computer hackers such as the Koobface gang in Russia. Computer hackers use botnets or ‘zombie’ computers to infiltrate high security computer servers and minimize attempts to be caught. A botnet is a collection of internet-connected computers that are controlled by a computer hacker that did the original infecting. “As well as using the computers they land on to spread themselves further, they're designed to take control of them, either to steal confidential user information or to convert them into remote-controlled 'zombie... ... middle of paper ... ...used-facebook-to-spread-worm-operates-in-the-open.html?pagewanted=all&_r=0>. Smith, Edward. "Gambling Websites Paying Protection to Cyber Blackmailers." . International Business Times, 19 July 2013. Web. 30 Apr. 2014. . Washkuch, Frank, Jr. "Rootkits, Blackmail Scams on the Rise." SC Magazine. Haymarket Media, Inc., 13 Apr. 2006. Web. 30 Apr. 2014. . ZHENGCHUAN, XU, HU QING, and ZHANG CHENGHONG. "Why Computer Talents Become Computer Hackers." Communications Of The ACM 56.4 (2013): 64-74. Academic Search Premier. Web. 28 Apr. 2014. "Zombie Master Jeanson Ancheta Pleads Guilty." Spam Daily News. Paessler, 23 Jan. 2006. Web. 28 Apr. 2014. .

Open Document