Pages

16 January, 2014

Gloomy forecast for security in 2014: McAfee Labs

In the world of security, the news for 2014 is all bad. McAfee Labs, the global source for threat research, threat intelligence, and cybersecurity thought leadership, expects threats in 2014 to evolve to address vulnerabilities in more areas than ever, especially through the rapidly growing mobile platform. 

According to the company's annual 2014 Predictions Report, released end-December 2013, the trends through its proprietary McAfee Global Threat Intelligence (GTI) service point to virtual currencies such as Bitcoin fuelling the growth of ransomware* across all platforms, including mobile.

“With target audiences so large, financing mechanisms so convenient, and cyber-talent so accessible, robust innovation in criminal technology and tactics will continue its surge forward in 2014,” said Vincent Weafer, Senior VP, McAfee Labs. 


“The activity in mobile and social is representative of an increasing ‘black hat’* focus on the fastest growing and most digitally active consumer audiences, in which personal information is almost as attractive as banking passwords. The emergence and evolution of advanced evasion techniques represents a new enterprise security battlefront, where the hacker’s deep knowledge of architectures and common security tactics enable attacks that are very hard to uncover.”

McAfee Labs foresees the following trends in 2014:

1. Mobile malware* will drive growth in both technical innovation and the volume of attacks in the overall malware “market” in 2014. In the last two quarters reported, new PC malware growth was nearly flat, while appearances of new Android samples grew by 33%. 


With businesses and consumers continuing their shift to mobile, McAfee Labs expects to see ransomware aimed at mobile devices, attacks targeting near-field communications (NFC) vulnerabilities, and attacks that corrupt valid apps to extract data without being detected.

2. Virtual currencies will fuel malicious ransomware attacks around the world. Virtual currencies provide cybercriminals with a conveniently unregulated and anonymous payment infrastructure through which to collect money from victims. Currencies such as Bitcoin will enable and accelerate new generations of ransomware such as the Cryptolocker threat of 2013.

3. Criminal gangs and state actors will deploy new stealth attacks that will be harder than ever to identify and stop. There will be broad adoption of advanced evasion techniques, such as the use of sandbox*-aware attacks that do not fully deploy unless they believe they are running directly on an unprotected device. Other attack technologies will include return-oriented programming attacks that cause legitimate applications to behave in malicious ways, self-deleting malware that covers its tracks after subverting a target, and advanced attacks on dedicated industrial control systems targeting public and private infrastructure.

4.
Social platforms, such as Facebook and Twitter, will be used more aggressively to target the finances and personal information of consumers, and the intellectual property and trade secrets of business leaders.  

McAfee Labs expects to see more attacks that leverage social platform features to capture passwords or data about user contacts, location, or business activities. Such information can be used to target advertising or perpetrate virtual or real-world crimes. Either directly or through third parties, enterprises will increasingly use “reconnaissance attacks” to capture valuable user and organisational information to gain tactical and strategic advantages.

5. In 2014, new PC attacks will exploit application vulnerabilities in HTML5, a standard which allows websites to come alive with interaction, personalisation, and rich capabilities. On the mobile platform, McAfee Labs is predicting attacks that will breach the browser’s “sandbox” and give attackers direct access to the device and its services. Cybercriminals will increasingly target vulnerabilities below* the operating system, in the storage stack and even in the BIOS*.

6. The evolving threat landscape will dictate adoption of big data security analytics to meet detection and performance requirements. In 2014, security vendors will continue to add new threat-reputation services and analytics tools that will enable them and their users to identify stealth and advanced persistent threats faster and more accurately than can be done today with basic “blacklisting”* and “whitelisting”* technologies.

7. Deployment of cloud-based corporate applications will create new attack surfaces that will be exploited by cybercriminals. Cybercriminals will look for more ways to exploit the ubiquitous hypervisors* found in all data centres, the multi-tenant access and communications infrastructure implicit in cloud services, and management infrastructure used to provision and monitor large-scale cloud services. 


Because they lack sufficient leverage to demand security measures in line with their organisational needs, small businesses that purchase cloud-based services will continue to grapple with security risks that are not addressed by cloud providers’ user agreements and operating procedures.

For a full copy of the 2014 Predictions Report from McAfee Labs, click here.  


*There is a lot of functionality 'below' the operating system which controls fundamental activities such as how data is stored onto a drive, how bright your display is, and what the computer does when the power switch is pressed. This is against the activities 'above' the operating system, such as starting up software like Microsoft Office, playing music when music file is clicked, etc.

*BIOS refers to the code that controls the chips on the motherboard.

*Black hat hackers are malicious versus white hat hackers who may hack so as to inform organisations of vulnerabilities.

*Blacklisting avoids everything in the blacklist as it is not approved, whereas whitelisting embraces everything in the whitelist as it is pre-approved.

*Hypervisors control how data is stored on physical machines so as to create what is known as a cloud, where data can be stored and delivered anytime, anywhere, on any device.

*Malware refers to malicious software.

*Ransomware is malicious software that causes a problem which can only be fixed through paying the hackers money.

*Sandboxes separate suspicious software from the existing system. The suspect software is tested in the sandbox, and only introduced into the system if it is found to be harmless.

No comments:

Post a Comment