SHARE
Facebook X Pinterest WhatsApp

The Black Hats Keep Striking

Jul 8, 2014

The Black Hats Keep Striking

Cyber-Attacks Afflict Majority of OrganizationsCyber-Attacks Afflict Majority of Organizations

60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to be the victim of one again in 2014.

Huge Increase in PoS MalwareHuge Increase in PoS Malware

Organizations saw seven times more point of sale malware in Q1 2014 compared with all of 2013.

Inadequate Defenses Against Cyber-ThreatsInadequate Defenses Against Cyber-Threats

25% of security professionals doubt whether their organization has invested adequately in cyber-threat defenses. Likewise, 25% of organizations lack the tools necessary to properly investigate the root cause of an attack.

Online Banking Suffers From New MalwareOnline Banking Suffers From New Malware

The study uncovered a ZeuS/ZBOT variant and spam attachment, a BANDLOAD variant that affected only Latin Americans, and a fake WhatsApp client to spread BANDLOAD when it is downloaded.

New Target: Virtual CurrenciesNew Target: Virtual Currencies

Cybercriminals have moved toward a new lucrative monetary source: virtual currencies. For example, a Tokyo-based Bitcoin exchange declared bankruptcy after it lost 550,000 Bitcoins, worth U.S. $473 million, due to a cyber-attack.

Wave of DDoS AttacksWave of DDoS Attacks

DDoS attacks targeted versions of the NTP protocol in Q1 2014, compromising networks and using them to flood targets with packet replies and error warnings.

Mobile Threat Landscape MaturingMobile Threat Landscape Maturing

Malicious app and Web threats have evolved into attacks on the Android platform that paralyze entire devices. Also, plagued by the “goto fail” bug, iOS’s Secure Sockets Layer succumbed and users became vulnerable to eavesdropping and Web hijacking.

New Adware Stymies CleanupsNew Adware Stymies Cleanups

47% of attack victims were compromised by new adware, with premium message service users trailing close behind at 35%, perhaps due to the emergence of new adware families and network carrier efforts to thwart mobile fraud by dropping premium message service charges.

Vulnerability Checks Are InfrequentVulnerability Checks Are Infrequent

Less than half of organizations conduct full-network vulnerability scans more than once every quarter.

Safeguarding Mobile DevicesSafeguarding Mobile Devices

To protect the data transmitted via smartphones and tablets, 60% of respondents use VPN and 56% use Network Access Control.

PoS Malware Family GrowthPoS Malware Family Growth

In Q1 2014, the nefarious point-of-sale malware included ALINA, which checks for credit card information that can be stolen; FYSNA, which uses the Tor network to retain anonymity while committing bad deeds; and HESETOX, which uploads stolen data to command-and-control servers.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.