Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

SonicWall Names Top 2010 Cybercrime Threats

Web-based attacks and threats to corporate cloud computing spiked spiked dramatically in the first half of 2010 according to a report from the firewall vendor.

Slideshow: Cloud Security Pros And Cons
(click for larger image and for full photo gallery)
Attacks against web and SaaS applications comprised just 4% of all cybercrime attacks in 2009, but by July 2010 accounted for 45% of all attacks, outstripping SQL injection, viruses and attacks via FTP.

That finding comes from a new study by firewall vendor SonicWall, examining the biggest threats seen in the first half of 2010.

SonicWall said it's seeing a shift from "simple scams, such as phishing exploits, spoofing of organizations, worms and viruses, to more sophisticated attacks shutting down network servers and cloud-based systems." These more sophisticated and sometimes blended attacks are more difficult to stop than traditional attacks, since they're more likely to exploit never-before-seen, zero-day vulnerabilities and thus foil signature-based defenses.

"With the sophistication of today's attacks, companies need to anticipate that heuristics, algorithms and behavioral analysis will be needed to supplement the security signatures that corporations receive," said Boris Yanovsky, vice president of software engineering at SonicWall.

One measure of the increasing prevalence of more sophisticated attacks is the volume of malware circulating online, which has increased markedly. Indeed, SonicWall said that the number of instances of malware it detected grew from January to July 2010 by a factor of three -- from 60 million to 180 million. On a daily basis, the firm is now seeing about 3 million malware attempts, 400 million attempted online intrusions and 400 million spam emails.

In the first half of 2010, SonicWall also saw a marked increase in the amount of phishing attacks which utilize tax scams, affecting not just the United States and United Kingdom -- historically popular targets -- but increasingly also Australia, Canada, China and India.

While the SonicWall study rounds up the last six months in cybercrime, what might organizations anticipate, going forward? Expect more malware aimed at smartphones, Apple OS X and iOS, Adobe Acrobat, and smartphones, said Yanovsky. "We also anticipate hacks will exploit bots developed by SpyEye," he said. "This new, web-based crimeware toolkit simplifies stealing financial and sensitive personal information."

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...