Smarter, shadier and stealthier cyber-crime forces dramatic change

  • Sophos Security Threat Report highlights shifting crime tactics and what to expect in 2014
  • IoT gives cyber-criminals the potential to impact our daily lives, not just steal financial data

Smarter, shadier and stealthier cyber-crime forces dramatic changeTHE year 2013 saw cyber-criminals continuing to professionalise their ‘industry,’ offering easy to buy and use services that amplified the scale of cyber-crime to levels never seen before, according to Sophos.
 
The company has released its latest Security Threat Report, which outlines significant changes in cyber-criminal behaviour over the course of the past year, and also predicts their preferred methods of attack in 2014.
 
“While many security experts are aware of the high-level trends, few have recognised their significance,” said James Lyne (pic), global head of security research at Sophos.
 
“If 2013 has taught us anything, it is that traditional security controls are struggling. These new behaviours are forcing the industry to adapt and change, and widely held best practices must be reconsidered,” he added.
 
The threat report highlights new security concerns ranging from stealthy malware tools that offer dynamic camouflage and provide attackers with long-term persistent access to users’ data; to the proliferation of connected devices that represent new and often ill-protected targets.
 
Many new ‘Internet of Things’ (IoT) devices are becoming commonplace in our homes and everyday infrastructure, offering shadier cyber-criminals the potential to impact our daily lives, rather than just the traditional theft of financial information, Sophos said in a statement.
 
“These trends are set to continue in 2014 as threats become even smarter, shadier and stealthier,” said Lyne.
 
In 2014 Sophos predicts greater focus from cyber-criminals on high quality and convincing phishing and social engineering to compensate for harder to exploit operating systems like Windows 8.1.
 
Embedded devices (such as POS or point-of-sales systems, medical systems and new ‘smart’ infrastructure) will open old wounds as security mistakes eliminated in the modern PC environment are carelessly re-implemented.
 
Furthermore, attacks on corporate and personal data in the cloud will continue to grow as providers struggle to refine the security strategy in this new computing platform; and malware for mobile is set to become as sophisticated as its PC relatives.
 
“It is clear in 2014 we need to be watching not just the evolution of existing attacks, but be prepared for dangerous new threats emerging that we haven’t previously dealt with,” said Sophos chief technology officer Gerhard Eschelbeck.
 
“As the industry adapts and enhances protection mechanisms to cover new devices and threats, this is increasingly becoming an issue for every member of society, not just for government and business,” he added.
 
A full copy of the Threat Report 2014: Smarter, Shadier, Stealthier Malware containing more information and statistics on cybercrime in 2013, as well as top tips and predictions on emerging trends, can be downloaded here. A blog discussing the Threat Report 2014 is also available.
 
Related Stories:
 
‘Hackers’ – tech reality finally catches up with Hollywood?
 
FortiGuard Labs’ five security predictions for 2014
 
Govt malware, insider threats to dominate security landscape: CyberArk
 
 
For more technology news and the latest updates, follow @dnewsasia on Twitter or Like us on Facebook.

 
Keyword(s) :
 
Author Name :
 
Download Digerati50 2020-2021 PDF

Digerati50 2020-2021

Get and download a digital copy of Digerati50 2020-2021