ENP Newswire -
Release date- 29122013 -
'With target audiences so large, financing mechanisms so convenient, and cyber-talent so accessible, robust innovation in criminal technology and tactics will continue its surge forward in 2014,' said
1. Mobile malware will be the driver of growth in both technical innovation and the volume of attacks in the overall malware 'market' in 2014. In the last two quarters reported, new PC malware growth was nearly flat, while appearances of new Android samples grew by 33%. With businesses and consumers continuing their shift to mobile, we expect to see ransomware aimed at mobile devices, attacks targeting near-field communications vulnerabilities, and attacks that corrupt valid apps to expropriate data without being detected.
2. Virtual currencies will fuel malicious ransomware attacks around the world. Although largely a positive development, virtual currencies provide cybercriminals the unregulated and anonymous payment infrastructure they need to collect money from their victims. Currencies such as Bitcoin will enable and accelerate new generations of ransomware such as the Cryptolocker threat of 2013.
3. In the spy vs. spy world of cybercrime and cyber warfare, criminal gangs and state actors will deploy new stealth attacks that will be harder than ever to identify and stop. There will be broad adoption of advanced evasion techniques, such as the use of sandbox-aware attacks that do not fully deploy unless they believe they are running directly on an unprotected device. Other attack technologies will include return-oriented programming attacks that cause legitimate applications to behave in malicious ways, self-deleting malware that covers its tracks after subverting a target, and advanced attacks on dedicated industrial control systems targeting public and private infrastructure.
4. 'Social attacks' will be ubiquitous by the end of 2014. We expect to see more attacks that leverage social platform features to capture passwords or data about user contacts, location, or business activities. Such information can be used to target advertising or perpetrate virtual or real-world crimes. Either directly or through third parties, enterprises will increasingly use 'reconnaissance attacks' to capture valuable user and organizational information to gain tactical and strategic advantages.
5. New PC and server attacks will target vulnerabilities above and below the operating system. In 2014, new PC attacks will exploit application vulnerabilities in HTML5, which allows websites to come alive with interaction, personalization, and rich capabilities for programmers. On the mobile platform, we expect to see attacks that will breach the browser's 'sandbox' and give attackers direct access to the device and its services. And cybercriminals will increasingly target vulnerabilities below the operating system in the storage stack and even the BIOS.
6. The evolving threat landscape will dictate adoption of big data security analytics to meet detection and performance requirements. In 2014, security vendors will continue to add new threat-reputation services and analytics tools that will enable them and their users to identify stealth and advanced persistent threats faster and more accurately than can be done today with basic 'blacklisting' and 'whitelisting' technologies.
7. Deployment of cloud-based corporate applications will create new attack surfaces that will be exploited by cybercriminals. Cybercriminals will look for more ways to exploit the ubiquitous hypervisors found in all data centers, the multitenant access and communications infrastructure implicit in cloud services, and management infrastructure used to provision and monitor large-scale cloud services. Because they lack sufficient leverage to demand security measures in line with their organizational needs, small businesses that purchase cloud-based services will continue to grapple with security risks unaddressed by cloud providers' user agreements and operating procedures.
For a full copy of the 2014 Predictions Report from
McAfee, a wholly owned subsidiary of
Note: McAfee is a trademark or registered trademark of
[Editorial queries for this story should be sent to email@example.com]
((Comments on this story may be sent to firstname.lastname@example.org))
Most Popular Stories
- Obama Plugs ACA on Zach Galifianakis Show
- Rand Paul Takes Pot Shot at Ted Cruz
- Senate Dems Pull All-Nighter on Global Warming
- Why New Workers Can't Get Ahead
- Dianne Feinstein Accuses CIA of Spying on Congress
- 'The Bachelor' Juan Pablo Picks His Love
- Snowden Urges Silicon Valley to Resist Internet Spying
- FBI Helping Ukraine Recover Stolen Billions
- Miley Cyrus Performs in Undies After Costume Goes Missing
- Software Writers Sought in Indiana