Vulnerabilities / Threats
1/3/2011
08:48 AM
50%
50%

For Hackers, 2011 Looks Like A Prosperous New Year

If you're an attacker, the new year is a target-rich environment. Here are five areas where you should shore up your defenses

In life, it's said, there are a few things that are certain. April will bring the tax bill; July will bring the fireworks; September will bring the school bus. And if you're an editor at an IT security publication, there's one more: December will bring cyberthreat predictions for the new year.

Each year, we at Dark Reading are inundated by dozens of predictions from security vendors, researchers, and analysts, all of whom hope to be the first to warn enterprises about the attacks and exploits they should expect in the coming months. And each year, we're compelled to share some of those predictions with you, dear reader. We don't wanna do it. But it's the law.

And so, we present -- kicking and screaming -- five threat trends you should beware of in 2011. Read it carefully and nobody gets hurt.

1. Social networks will be a chief target for new exploits.
"With the growth of social networks, banks are getting on the bandwagon and using these networks to cater to their customers," says Internet Identity (IID), an Internet security firm, in its predictions blog. "But beware: there will be fakes that will utilize social networking sites like Twitter and Facebook to try to infect victims with malware and trick people into giving up their vital personal information like bank logins and social security numbers."

"As the use of social media web sites continues to grow, drive-by-downloads and rogue anti-virus will be used more aggressively on platforms such as Facebook and Twitter," says Dasient, a security service provider that specializes in malware defense. "This is evidenced by threats such as the Koobface botnet that continually targets Facebook, as well as the September XSS attack that targeted Twitter and redirected users to porn and malware sites."

2. When they aren't targeting social networks, the bad guys will be after your mobile device.
"While most hackers heavily focused on Nokia's mobile phones [in 2010], mobile malware will increasingly target non-Nokia devices including Apple, Blackberry, Android, and Microsoft," says a report from ICSA Labs, which does certification testing for security products. "Mobile malware -- which is currently very localized to Russia, where premium SMS is available -- will start becoming more prevalent in other regions as well. Additionally, malware will increasingly target mobile devices, such as smart phones, iPads, and other tablets with built-in Wi-Fi."

"The arrival of consumer devices in the corporate network environment is changing the way we think about security the corporate backbone," says Adam Powers, CTO of Lancope, whose technology identifies security problems by analyzing network behavior. "Perimeter-based defenses, such as firewalls and IPS, aren't enough anymore. Corporations must think about how they will deal withsmart phones, WiFi devices, and other consumer-oriented mobile devices."

3. Malware will become more complex, combining multiple exploits and attack techniques.
"One of the most threatening advances in malware during 2010 broadened the range of targets beyond PCs and servers when the Stuxnet Trojan attacked programmable logic controllers," says security vendor Symantec in its 2011 predictions blog. "This specialized malware written to exploit physical infrastructures will continue in 2011, driven by the huge sums of money available to criminal enterprises at low risk of prosecution. These attacks will range from the obvious targets like smartphones to any number of less obvious, yet critical systems like power grid controls or electronic voting systems. Any technology that can be exploited for financial gain."

"Stuxnet clones will be rampant in 2011, but the real threats will be far more dangerous and sophisticated," says Toney Jennings, president and CEO of CoreTrace, a maker of application whitelisting tools. "Stuxnet was too public, too easily discovered, and reverse-engineered. From my days in the trenches at the Air Force Information Warfare Center, I feel it in my bones that Stuxnet was a 'grenade,' and that there are digital bombs out there that are far more powerful and dangerous."

NEXT: Predictions 4 & 5 Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0543
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2015-0544
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly generate random values for session cookies, which makes it easier for remote attackers to hijack sessions by predicting a value.

CVE-2015-4129
Published: 2015-07-05
SQL injection vulnerability in Subrion CMS before 3.3.3 allows remote authenticated users to execute arbitrary SQL commands via modified serialized data in a salt cookie.

CVE-2015-0547
Published: 2015-07-04
The D2CenterstageService.getComments service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0548
Published: 2015-07-04
The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report