October/November 2015 Digital Edition
Digital Version of July/August 2015
June/July 2015 Digital Edition
Digital Version of May/June 2015
McAfee’s predictions of top cyber threats in 2012
McAfee unveiled on Dec. 28 its 2012 Threat Predictions report, which outlines the top threats that McAfee foresees for the coming year.
The list indicates that emerging threats from 2011 are on track to become the major players for cyber activity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee Labs also predicts that attacks involving political motivation or notoriety will also make headlines, including high-profile industrial attacks, cyber warfare demonstrations and hacktivist attacks targeting public figures.
“Many of the threats that will become prominent in 2012 have already been looming under the radar in 2011,” said Vincent Weafer, senior vice president of McAfee Labs. “Over the past year, the general public has become more aware of some of these risks, such as threats to critical infrastructure or the impact of hacktivism, as they gain international media attention. In the meantime, we continue to see cybercriminals improving their toolkits and malware and are ready to make a significant impact in 2012.”
McAfee Labs Threat Predictions for 2012:
( 1 ) Industrial attacks: Cyber criminals target utilities
Water, electricity, oil and gas are essential to people’s everyday lives, yet many industrial systems are not prepared for cyber attacks. Many of the environments where SCADA (supervisory control and data acquisition) systems are deployed don’t have stringent security practices. As with recent incidents directed at water utilities in the U.S., attackers will continue to leverage this lack of preparedness, if only for blackmail or extortion in 2012.
( 2 ) Advertisers will “legalize” spam
McAfee Labs has seen a drop in global spam volumes in the past two years. However, legitimate advertisers are picking up where the spammers left off, using the same spamming techniques, such as purchasing email lists of users who have “consented” to receive advertising or purchasing customer databases from companies going out of business. McAfee Labs expects to see this “legal” spam, and the technique known as “snowshoe spamming,” to continue to grow at a faster rate than illegal phishing and confidence scams.
( 3 ) Mobile threats: Attackers will bypass PCs
2011 saw the largest levels in mobile malware history. In 2012, McAfee Labs expects for mobile attackers to improve on their skill set and move toward mobile banking attacks. Techniques previously dedicated for online banking -- such as stealing from victims while they are still logged on, while making it appear that transactions are coming from the legitimate user -- will now target mobile banking users. McAfee Labs expects attackers will bypass PCs and go straight after mobile banking apps, as more and more users handle their finances on mobile devices.
( 4 ) Embedded hardware: The promised land for sophisticated hackers
Embedded systems are designed for a specific control function within a larger system and are commonly used in automotive, medical devices, GPS devices, routers, digital cameras and printers. McAfee Labs expects to see proofs-of-concept codes exploiting embedded systems to become more effective in 2012 and beyond. This will require malware that attacks at the hardware layer, and will enable attacks to gain greater control and maintain long-term access to the system and its data. Sophisticated hackers will then have complete control over hardware.
( 5 ) Hacktivism: Joining forces online and on the front lines
McAfee Labs predicts that in 2012, either the “true” Anonymous group will re-invent itself, or die out. Additionally, those leading the digital disruptions will join forces with physical demonstrators, and will target public figures, such as politicians, industry leaders, judges and law enforcement, more than ever before.
( 6 ) Virtual currency: A cyber criminal payment plan
Virtual currency, sometimes called cyber currency, has become a popular way for people to exchange money online. These online “wallets” are not encrypted and the transactions are public, making them an attractive target for cyber criminals. McAfee Labs expects to see this threat evolve into spam, data theft, tools, support networks and other associated services dedicated solely to exploiting virtual currencies, in order to steal money from unsuspecting victims or to spread malware.
( 7 ) Cyber war: Flexing its muscles
Countries are vulnerable due to massive dependence on computer systems and a cyber defense that primarily defends only government and military networks. Many countries realize the crippling potential of cyber attacks against critical infrastructure, such as water, gas and power, and how difficult it is to defend against them. McAfee Labs expects to see countries demonstrate their cyber war capabilities in 2012, in order to send a message.
( 8 ) Rogue certificates: Untrustworthy and undetectable