Public Utilities, Government Attacks and Targeted Threats Dominate Q2 2015

The second quarter of 2015 was wrought with high profile vulnerabilities and hacks. Cybercriminalshacking cyber threat became more inventive in their attack methods to infiltrate and abuse existing technologies that are often overlooked.

These developments are analyzed in the Trend Micro Incorporated (TYO: 4704; TSE: 4704) Q2 security roundup report released today, “A Rising Tide: New Hacks Threaten Public Technologies.” It details the evolution of tools and methods attackers use to get the greatest return on every cybercrime investment.

Hackers are taking more strategic approaches, refining their approach and targeting more selective victims to improve their infection rates. This is reflected by the exponential increase in the use of several traditional attack methods, including a 50 percent increase in the integration of the Angler exploit kit, a 67 percent growth in overall exploit kit-related threats, and CryptoWall ransomware becoming highly targeted, with 79 percent of infections occurring in the U.S.

Report highlights include:

Hacks causing disruptions to public utilities

Broadcast networks, airplanes, automated vehicular systems and home routers pose not only the risk of malware infections, but physical inconveniences and threats.

Lone wolf cybercriminals gain notoriety via successful ransomware and PoS attacks
FighterPoS and MalumPoS deployed by solo hackers “Lordfenix” and “Frapstar,” along with Hawkeye keylogger attacks, demonstrated that single individuals are capable of making a significant impact in today’s threat marketplace.

Government entities fight back against cybercrime

Interpol, Europol, the Department of Homeland Security and the FBI all played a role in taking down longstanding botnet operations. Additionally, the indictment of Silk Road founder Ross Ulbricht brought to light the nebulous nature and dangers of the Dark Web.

National and political impacts were made by attacks on government organizations

The attack on OPM was a shocking realization that no one’s personal data is safe. Macro malware, island-hopping and C&C servers were among the tactics used to target government data in this and similar breaches.

Public-facing websites and mobile devices were threatened in new ways

While threats to software are always present, vulnerabilities in Web apps were proven to be just as dangerous. Attackers will leverage any vulnerability available and custom applications need custom security attention to ensure those entry points are eliminated.

Advertisement

No comments yet.

Leave a Comment

Comment moderation is enabled. Your comment may take some time to appear.