Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Personal Tech
24/7/365 Network Uptime
Average Rating:
Rate this article:  
McAfee Says Beware of Ransom-Ware Attacks in 2013
McAfee Says Beware of Ransom-Ware Attacks in 2013

By Jennifer LeClaire
January 2, 2013 7:54AM

    Bookmark and Share
Due to many uncoordinated and unclear operations and false claims, McAfee predicts the Anonymous hacktivist movement will slow down in 2013. Anonymous' level of technical sophistication has stagnated and its tactics are better understood by its potential victims, and as such, the group's level of success will decline, McAfee said.
 



Cybercriminals will focus even more on mobile devices in 2013, but Anonymous attacks will decline. So says McAfee's 2013 Threat Predictions report.

"Cybercriminals and hacktivists will strengthen and evolve the techniques and tools they use to assault our privacy, bank accounts, mobile devices, businesses, organizations and homes," said Vincent Weafer, senior vice president of McAfee Labs. "Only by understanding and preparing for threats can we empower people to secure their information."

Mobile Threats Rising

The number of mobile threats increased dramatically in 2012, as ransom-ware expanded into mobile devices. McAfee predicts the development and deployment of increasingly sophisticated ransom-ware technologies that will "lock up" a phone or tablet and threaten to keep it that way until a ransom is paid, will be a prominent trend in 2013.

The security firm says users have no way of knowing if their device will be unlocked even if they do meet the perpetrator's demands. Since attackers hijack the users' ability to access data, McAfee said, victims will be faced with either losing their data or paying a ransom in the hope of regaining access.

McAfee also pointed to a new mobile worm it expects will go on a major shopping spree in 2013. The Android/Marketpay.A Trojan horse program buys apps without user permission. In 2013 cyber-crooks will take this malware's app-buying payload and add it to a mobile worm so attackers won't need victims to install a piece of malware, the firm predicted.

And it seems mobile phones with NFC-enabled "digital wallets" are an easy target for cyber-thieves. McAfee expects attackers to create mobile worms with NFC capabilities to steal money via the "bump and infect" method, most commonly used in areas with dense populations like airports and malls.

The Decline of Anonymous

Due to many uncoordinated and unclear operations and false claims, McAfee predicts the Anonymous hacktivist movement will slow down in 2013. Anonymous' level of technical sophistication has stagnated and its tactics are better understood by its potential victims, and as such, the group's level of success will decline. While hacktivist attacks won't end in 2013, if ever, they are expected to decline in number and sophistication.

"Nation-states and armies will be more frequent actors and victims of cyberthreats. Patriot groups self-organized into cyberarmies have had little impact up until this point, but their actions will improve in sophistication and aggressiveness," the report said. "In 2013, many more of the world's military units will be on the front line of social networks communicating more frequently. State-related threats will increase and make the headlines, while suspicions about government-sponsored attacks will grow."

McAfee also noted how cybercriminals are notorious for going onto public forums to make business deals with other criminals to offer not only software, but also hacking as a service. As the number of invitation-only criminal forums requiring registration fees is increasing to make forums more secure and anonymous, the firm predicts these offers will be easier to find on the Internet in 2013.

"Citadel will become the Trojan of choice among cybercriminals -- with the recent release of Citadel Rain, the Trojan can now dynamically retrieve configuration files, enabling a fraudster to send a targeted payload to a single victim or a selection of victims," the report said. "Detection will become more difficult as the footprint on the endpoint is minimal until the attack actually occurs."
 

Tell Us What You Think
Comment:

Name:

Maureen Robinson:

Posted: 2013-01-14 @ 12:41am PT
Great article! There isn't a security threat that you can think of that some security company's marketing literature doesn't promise a solution for. But despite the zeal of marketers and the production of many great security solutions, there are still many threats to enterprise IT that simply cannot be offset, mitigated or prevented by a single technology solution. There also is a lot of misinformation out there that makes for uninformed security professionals and software developers. It's not uncommon to hear things like "well, I run a web vulnerability scanning tool that catches the majority of vulnerabilities", or "my Web Application Firewall mitigates any security holes in my applications" or "the frameworks we use prevent developers from writing insecure code." I cringe when I hear this because I know from experience that tools, frameworks and technologies can only automate, protect, and sandbox your software applications so much. Here's a great article on what tools, technologies and best practices can and cannot protect against: http://blog.securityinnovation.com/blog/2012/12/securing-application-it-systems-what-tools-technologies-and-best-practices-can-and-cannot-protect-ag.html. Hope you find it useful!



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Personal Tech
1.   iPad Hacker Conviction Overturned
2.   Report: Many Users Never Tweet
3.   Review: Galaxy S5 Features Useful
4.   Is a Web Site Safe from Heartbleed?
5.   Roku Streaming Stick Packs a Punch


advertisement
BlackBerry Drops T-Mobile After Spat
Moving on to other carriers after snub.
Average Rating:
Android Wear on Tap for Wearables
OK Google, what's really new here?
Average Rating:
Is Zuckerberg Nuts To Buy Oculus VR?
$2 billion deal for unproven company.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tips To Defeat the Heartbleed Bug
Heartbleed headlines continue as IT admins scramble for answers no one has. Early reports of stolen personal data, including 900 social insurance numbers in Canada, are starting to trickle in.
 
NSC Backs Disclosing Software Vulnerabilities
Disclosing vulnerabilities in commercial and open source software is in the national interest and shouldn't be withheld unless there is a clear need, says the National Security Council.
 
Heartbleed Flaw Affects Hardware, Too
It appears the Heartbleed security bug affects not just Web sites, but also the networking equipment that connects businesses and homes to the Net, including Cisco and Juniper's equipment.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
Google Glass may find its first markets in verticals in which hands-free access to data is a boon. Medicine is among the most prominent of those, as seen in a number of Glass experiments under way.
 

Mobile Technology Spotlight
Is Amazon Launching a 3D Smartphone?
Once known for selling books on an e-commerce platform, Amazon is now a bona fide hardware maker -- and it's reportedly rolling out an innovative smartphone with a 3D screen.
 
Review: S5 Features Useful, Less About Gimmicks
There's a lot to like about Samsung's new Galaxy S5 smartphone -- among them, its relative lack of features. Samsung chose to focus on features people might actually want, not gimmicks.
 
Analyst: Samsung Galaxy S5 Won't Sway iPhone Lovers
The Samsung Galaxy S5 hits store shelves on Friday and the reviews are starting to pour in. The question is: Can the latest in the Galaxy line grab more market share from Appleā€™s iPhone?
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.