For Hackers, 2011 Looks Like A Prosperous New Year
If you're an attacker, the new year is a target-rich environment. Here are five areas where you should shore up your defenses
In life, it's said, there are a few things that are certain. April will bring the tax bill; July will bring the fireworks; September will bring the school bus. And if you're an editor at an IT security publication, there's one more: December will bring cyberthreat predictions for the new year.
Each year, we at Dark Reading are inundated by dozens of predictions from security vendors, researchers, and analysts, all of whom hope to be the first to warn enterprises about the attacks and exploits they should expect in the coming months. And each year, we're compelled to share some of those predictions with you, dear reader. We don't wanna do it. But it's the law.
More Security Insights
- Forrester Study: The Total Economic Impact of VMware View
- Securing Executives and Highly Sensitive Documents of Corporations Globally
- Top Big Data Security Tips and Ultimate Protection for Enterprise Data
- Smarter Process: Five Ways to Make Your Day-to-Day Operations Better, Faster and More Measurable
And so, we present -- kicking and screaming -- five threat trends you should beware of in 2011. Read it carefully and nobody gets hurt.
1. Social networks will be a chief target for new exploits.
"With the growth of social networks, banks are getting on the bandwagon and using these networks to cater to their customers," says Internet Identity (IID), an Internet security firm, in its predictions blog. "But beware: there will be fakes that will utilize social networking sites like Twitter and Facebook to try to infect victims with malware and trick people into giving up their vital personal information like bank logins and social security numbers."
"As the use of social media web sites continues to grow, drive-by-downloads and rogue anti-virus will be used more aggressively on platforms such as Facebook and Twitter," says Dasient, a security service provider that specializes in malware defense. "This is evidenced by threats such as the Koobface botnet that continually targets Facebook, as well as the September XSS attack that targeted Twitter and redirected users to porn and malware sites."
2. When they aren't targeting social networks, the bad guys will be after your mobile device.
"While most hackers heavily focused on Nokia's mobile phones [in 2010], mobile malware will increasingly target non-Nokia devices including Apple, Blackberry, Android, and Microsoft," says a report from ICSA Labs, which does certification testing for security products. "Mobile malware -- which is currently very localized to Russia, where premium SMS is available -- will start becoming more prevalent in other regions as well. Additionally, malware will increasingly target mobile devices, such as smart phones, iPads, and other tablets with built-in Wi-Fi."
"The arrival of consumer devices in the corporate network environment is changing the way we think about security the corporate backbone," says Adam Powers, CTO of Lancope, whose technology identifies security problems by analyzing network behavior. "Perimeter-based defenses, such as firewalls and IPS, aren't enough anymore. Corporations must think about how they will deal withsmart phones, WiFi devices, and other consumer-oriented mobile devices."
3. Malware will become more complex, combining multiple exploits and attack techniques.
"One of the most threatening advances in malware during 2010 broadened the range of targets beyond PCs and servers when the Stuxnet Trojan attacked programmable logic controllers," says security vendor Symantec in its 2011 predictions blog. "This specialized malware written to exploit physical infrastructures will continue in 2011, driven by the huge sums of money available to criminal enterprises at low risk of prosecution. These attacks will range from the obvious targets like smartphones to any number of less obvious, yet critical systems like power grid controls or electronic voting systems. Any technology that can be exploited for financial gain."
"Stuxnet clones will be rampant in 2011, but the real threats will be far more dangerous and sophisticated," says Toney Jennings, president and CEO of CoreTrace, a maker of application whitelisting tools. "Stuxnet was too public, too easily discovered, and reverse-engineered. From my days in the trenches at the Air Force Information Warfare Center, I feel it in my bones that Stuxnet was a 'grenade,' and that there are digital bombs out there that are far more powerful and dangerous."
NEXT: Predictions 4 & 5