Expert: Organized crime behind Sobig?: zdnet.com

  • Thread starter Ivan Seeking
  • Start date
  • Tags
    crime
In summary, the Sobig virus is a computer worm that was discovered in 2003 and spreads through email attachments and network shares. There is evidence to suggest that organized crime may be behind its creation and distribution. It stands out from other viruses due to its use of social engineering tactics and ability to spread rapidly. Its potential consequences include theft of personal information and financial losses. To protect against the Sobig virus, individuals and organizations should have up-to-date antivirus software and be cautious when opening email attachments.
  • #1
Ivan Seeking
Staff Emeritus
Science Advisor
Gold Member
8,142
1,760
A leading antivirus expert has voiced concerns that users and organizations are going to be so busy worrying about the sheer size of the Sobig infection that they will "take their eyes off the ball" in terms of the real threat.

http://zdnet.com.com/2100-1105_2-5067494.html
 
Computer science news on Phys.org
  • #2
I had heard that they may have found the poeple that wrote it. A mass mailing company in CO. I work for Norton in the virus removal department and have see it some pretty harsh things to peoples systems...
 
  • #3


It is certainly a valid concern that the widespread panic and focus on the size of the Sobig infection may distract individuals and organizations from the true threat at hand - organized crime. As the expert mentioned, the sheer size and scale of the Sobig infection can be overwhelming and may cause people to lose sight of the fact that this is a deliberate attack by organized criminals.

It is important for individuals and organizations to not only focus on protecting themselves against the Sobig virus, but also to be aware of the motives and tactics of organized crime. By understanding the bigger picture, we can better prepare and protect ourselves against future attacks.

Additionally, it is crucial for law enforcement and cybersecurity agencies to work together to identify and take down these organized crime networks. This requires a coordinated effort and constant vigilance in monitoring and investigating these attacks.

In the face of such a large-scale and sophisticated threat, it is crucial for all parties to remain vigilant and not let the panic and chaos distract from the bigger issue at hand. By staying informed and working together, we can better defend against organized crime and protect our digital infrastructure.
 

FAQ: Expert: Organized crime behind Sobig?: zdnet.com

What is the Sobig virus?

The Sobig virus is a computer worm that was first discovered in 2003. It is a type of malware that spreads through email attachments and network shares, and can cause damage to a computer's system files and steal sensitive information.

Is it true that organized crime is behind the Sobig virus?

There is evidence to suggest that organized crime may have played a role in the creation and distribution of the Sobig virus. However, it is difficult to definitively prove this connection as cybercriminals often operate anonymously and can cover their tracks.

What makes the Sobig virus different from other computer viruses?

The Sobig virus is unique in that it uses social engineering tactics to trick users into opening infected email attachments. It also has the ability to send itself to contacts in the infected user's address book, allowing it to spread rapidly.

What are the potential consequences of a Sobig virus infection?

A Sobig virus infection can result in a range of consequences, including theft of personal information, disruption of computer systems and networks, and financial losses. It can also make a computer more vulnerable to future attacks.

How can individuals and organizations protect themselves from the Sobig virus?

To protect against the Sobig virus and other malware threats, it is important to have up-to-date antivirus software and to regularly backup important files. Users should also exercise caution when opening email attachments and be wary of suspicious emails from unknown senders.

Back
Top