SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
1

2014
2

3

4

5

6

7

8

Security Predictions
Table of Contents

1
2
3
4
5
6
7
8

INTRO

2014

Security
Predictions

Advanced malware volume will decrease.

A major data-destruction attack will happen.
Attackers will be more interested in cloud data
than your network.
Redkit, Neutrino and other exploit kits will struggle
for power in the wake of the Blackhole author arrest.
Java will remain highly exploitable and highly
exploited — with expanded repercussions.
Attackers will increasingly lure executives and compromise organizations via professional social networks.
Cybercriminals will target the weakest links in
the “data-exchange chain.”
Mistakes will be made in “offensive” security
due to misattribution of an attack’s source.

Every fall, Websense® Security Labs™ researchers predict
the key threats your organization should prepare for in the
coming year. They arrive at their predictions after carefully
analyzing data from a number of sources. These include the
core Websense technologies and security intelligence that
informs our industry-leading security solutions, as well as
trends in cyberthreats, technology, politics, economics
and more.
The following eight predictions and recommendations
indicate cybersecurity professionals are in for another
bumpy ride in 2014. Some of the biggest challenges will
come from areas where most security providers aren’t
even looking. You can use these insights to review current
defenses, identify security gaps and prepare new safeguards.
1

Advanced malware volume will decrease.

It probably sounds surprising to hear this from a cybersecurity company, but
according to the real-time telemetry feeds in Websense ThreatSeeker® Intelligence
Cloud, the quantity of new malware is beginning to decline. Unfortunately, this isn’t
good news.
Cybercriminals will rely less on high-volume advanced malware because over time
it runs a higher risk of detection. They will instead use lower volume, more targeted
attacks to secure a foothold, steal user credentials and move unilaterally throughout
infiltrated networks. Although the volume of attacks will decrease, the risk is even
greater because of the increasingly stealthy nature of threats. In many cases, a single
entry point into an organization’s network is enough to build up to a complex data
exfiltration attack.
Further, if cybercriminals steal user credentials, they can directly access cloud
services and mobility infrastructure (e.g., VPN or RDP). This access would allow
criminals to establish a presence by creating new domain-level user accounts,
without resorting to massive malware distribution.

Recommendation
Organizations can’t rely on anti-virus (AV), firewalls or other traditional security
measures to save their networks. Security teams need a comprehensive security
solution that not only detects malware activity, but goes a step further by detecting
and protecting against anomalous activity. It’s time to transform security thinking
from “setting and forgetting” to using technology that can stop threats by analyzing
irregular behavior and sleuthing through the data. Stopping the most advanced,
targeted attacks requires amplified information collecting that investigates threat
behavior in real time.
2

A major data-destruction attack will happen.

Most attackers historically used a network breach to steal information for profit.
In 2014, organizations need to be concerned about nation-states and cybercriminals
using a breach to destroy data. Ransomware — where cybercriminals hold corporate
data hostage and demand a ransom be paid in exchange for its release — will play
a part in this trend. In fact, the 2013 resurgence of CryptoLocker demonstrated how
one small piece of malware, on a single computer, can hold an entire organization
hostage by locking out network drives. This and other ransomware campaigns
were just the tip of the iceberg. We expect this trend to move down market,
affecting small- and medium-sized organizations.
The monetary gain for ransomware can prove to be extreme, hence the continued
motivation to employ this attack strategy. Unfortunately there is no guarantee that
the ransomed data will be returned. Many cybercriminals collect ransom without
returning the data to its rightful owner.

Recommendation
Make sure your organization is protected from targeted attacks, properly backs up
data and segments each network. This will eliminate attacker advantage if they gain
access, destroy your data or attempt to hold your sensitive information hostage.
In addition, deploy a comprehensive data loss prevention (DLP) solution to enable
your team to track and monitor the movement of your most sensitive data.
3

Attackers will be more interested in cloud
data than your network.

Cybercriminals will focus their attacks more on data stored in the cloud. This tactical
shift follows the movement of critical business data to cloud-based solutions such
as Google, Microsoft Office 365 and Confluence. They will find that penetrating the
data-rich cloud can be easier and more profitable than getting through the “castle
walls” of an on-premise enterprise network.
No doubt, attackers will still infiltrate enterprise networks to target users, steal
information and compromise their systems. However, such attacks will serve as an
intermediate step to gain access to third-party cloud services instead of an internal
data store.

Recommendation
Implement a comprehensive DLP solution that can help you identify what data is in
the cloud and where it resides. Understand who is accessing your data and ensure
these individuals have hardened access controls and the proper security training.
In addition, make sure that the database containing your most sensitive information
has extra protection.
4

Redkit, Neutrino and other exploit kits
will struggle for power in the wake of
the Blackhole author arrest.

The Blackhole exploit kit was arguably the most successful in history. Everything
changed in October 2013 when “Paunch,” the alleged hacker author behind the
famous kit, was arrested in Russia. Websense Security Labs predicts that we will
see a fight for market leadership between a number of new entrants and existing
exploit kits in 2014. Similar to brick-and-mortar criminal rings, now that the kingpin
is removed, others will rise in popularity and struggle for dominance.
Until the arrest of Paunch, Blackhole was used in the biggest percentage of exploit
activity, and for good reason: its owner was adept at staying up-to-date with the
most recent vulnerabilities. Blackhole had been followed in popularity by the Cool,
Gong da and Redkit exploit kits. But the exploit kit market was disrupted almost
immediately — within a month of Paunch’s arrest, Blackhole had dropped from the
top spot to number eight behind Redkit.
To fill the void, we anticipate Redkit and the Neutrino exploit kit will secure a strong
foothold in the coming year. Neutrino has incorporated Microsoft Internet Explorer
zero-days very quickly and has increasingly become a Blackhole replacement. We
also anticipate seeing fragmented exploit kits appear more frequently than top kits.
This fragmentation will increase the volume of exploit kits that information security
professionals need to monitor.

Recommendation
Information security professionals need to stay updated on how the exploit kit market
changes in 2014. Stay tuned to the Websense Security Labs blog for the latest news
on exploit kit developments: community.websense.com/blogs/securitylabs.
5

Java will remain highly exploitable and highly
exploited — with expanded repercussions.

Despite highly publicized and successful exploitations of Java vulnerabilities throughout 2013, most end points continue to run older versions of Java and therefore remain
extremely exposed to exploitation.1 The situation is not expected to change in 2014.
Pragmatism, not ignorance, is behind most decisions not to update Java.
Patching is still an unfeasible option for many organizations, particularly those
using business-critical applications that have not been updated to support more
recent versions of the platform. And alternative approaches combining a variety
of tactics are time-consuming for IT to design and implement.
In addition, we anticipate repercussions throughout the threat landscape.
These include:
•	 With numerous proven Java exploits to choose from, cybercriminals will
devote more time to finding new uses for tried-and-trusted attacks or to
crafting other aspects of their advanced, multi-stage attacks.2
•	 Cybercriminals will look elsewhere for similarly exploitable opportunities. Our researchers are paying particular attention to Flash, web-kits
and several other popular platforms that, like Java, are popular, readily
exploited and inconsistently updated.
•	 Cybercriminals will reserve the use of zero-day Java exploits for targeting
high-value networks with good Java patching practices.

Recommendation
To balance business needs with enterprise security requirements, the best
practices are to blend tactics. Patch, uninstall Java when it isn’t required, and
implement the “alternative browser” approach. The alternative browser approach
dedicates machines and browsers for the use of Java-based applications and all
others are kept secure against Java vulnerabilities. In addition, deploy comprehensive
and integrated cybersecurity solutions.
1

Websense Security Labs blog, 9/5/13, “New Java and Flash Research Shows a Dangerous Update Gap,” http://wb-sn.com/16p9YPz

2

Learn more about The Seven Stages of Advanced Threats at www.websense.com/sevenstages.
6

Attackers will increasingly lure
executives and compromise organizations
via professional social networks.

During the first stage of the advanced threat kill chain, cybercriminals conduct
reconnaissance to gather intelligence on their potential victims.3 In 2014, attackers will
increasingly use work-oriented social networks, such as LinkedIn, instead of personal
social media (e.g., Facebook) when targeting professionals. The information gathered
this way will be used to compromise networks.
We predict many of the cybercrime tactics that are successful when targeting personal social networking users will be applied in new, innovative ways within professional
social networks. For example, in October 2013, Websense Security Labs researchers
discovered a false LinkedIn profile that pinpointed targets for an upcoming phishing
campaign.4 A fake user named “Jessica Reinsch” contacted specific LinkedIn users
chosen for their job title, company size and other information. Cybercriminals then
lured these contacts to endorse the counterfeit account and visit their malicious
website. This added creditability for the fake profile and provided attackers with
insight into each target’s professional network.

Recommendation
Networking is a powerful business tool. Unfortunately, it can provide cybercriminals
access to a professional’s social connections and a direct communication channel
to deliver malware. To avoid becoming a victim of socially engineered cyberattacks,
members of LinkedIn and other professional social networks need to be wary of
those attempting to connect with them. Verify a legitimate relationship before adding
connections and determine why this person wants to interact. In addition, as a best
practice, educate your workforce about the reconnaissance stage of the advanced
threat kill chain.5

3

Learn more about the advanced threat kill chain at www.websense.com/sevenstages.

4

Websense Security Labs blog, 10/31/13, “LinkedIn Lure Looking for Love-ly Profiles, Possibly More,” http://wb-sn.com/1b6yO8y.

5

See again at www.websense.com/sevenstages.
7

Cybercriminals will target the weakest
links in the “data-exchange chain.”

Many high-value government and enterprise targets, after years of being hacked
or attacked, have significantly improved their defensive strategies and capabilities.
Cybercriminals will therefore increasingly go after the contractors, vendors and
others that comprise the “data-exchange chain” with the larger, more valuable
targets — for fewer of these partners have sufficient defenses. Any organization
in the data-exchange chain is a potential target or can serve as a means of
attacking the “big prize.”
As transactions move from using physical currency to digital forms such as
“electronic wallets,” the number of organizations in the data-exchange chain will
continue to grow. Cybercriminals could go after any organization in the chain that
collects, processes, records, or bills any part of these transactions.

Recommendation
You need to understand the extent of your organization’s data flow and ensure it
is protected at every stop along the way. Examine what security measures your
partners are taking and ask questions based on the nature of your relationship
and the business function they perform. In addition, develop criteria for email,
web, data, and cloud security measures that you expect your vendors and partners
to have in place.
8

Mistakes will be made in “offensive” security
due to misattribution of an attack’s source.

For several years, we’ve been hearing more about “offensive” security, where global
governments and enterprises have been threatening retaliatory strikes against anyone
caught attacking them or their interests. As in traditional warfare, tactical mistakes
will increasingly happen in these cybertrenches.
Security teams might feel justified in mounting counter-cyberattacks in response
to harmful incoming incidents, but the reality is that correctly attributing an attack’s
true source is exceptionally difficult even for the most experienced experts. Failure
to accurately identify the perpetrator could trigger a retaliatory strike against the
owner of a compromised website commandeered in the attack. As a result, the
innocent organizations caught in the crossfire will suffer varying and potentially
grave consequences.
Other repercussions are less clear but still potentially impactful. Attacks that hit
undeserving targets might result in numerous lawsuits among affected parties, and
the lack of legal precedent in this realm could delay or prevent timely resolution.

Recommendation
Never hack back, because offensive attacks do more harm than good. Instead, adopt
a robust incident response and security triage program to collect as much forensic
information as possible before passing it on to internal teams or trusted third parties.
The more information you can gather at this stage, the better. In addition, improve
your organization’s attack-prevention defenses by adding real-time defenses that
correlate with the advanced threat kill chain.6

6

See again at www.websense.com/sevenstages.
About Websense
Websense, Inc. is a global leader in protecting organizations from the latest
cyber attacks and data theft. Websense TRITON® comprehensive security
solutions unify web security, email security, mobile security and data loss
prevention (DLP) at the lowest total cost of ownership. Tens of thousands of
enterprises rely on Websense TRITON security intelligence to stop advanced
persistent threats, targeted attacks and evolving malware. Websense prevents
data breaches, intellectual property theft and enforces security compliance and
best practices. A global network of channel partners distributes scalable,
unified appliance- and cloud-based Websense TRITON solutions.
Websense TRITON stops more threats; visit www.websense.com/proveit to
see proof. To access the latest Websense security insights and connect through
social media, please visit www.websense.com/smc.

For more information, visit www.websense.com and www.websense.com/triton.

© 2013 Websense, Inc. All rights reserved. Websense, TRITON and the Websense logo are registered trademarks of Websense, Inc.
in the United States and various countries. All other trademarks are the properties of their respective owners. SecPredRep 11/14/13

Mais conteúdo relacionado

Mais procurados

Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
Alan Rudd
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
 

Mais procurados (19)

Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
 
The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
Achieving high-fidelity security
Achieving high-fidelity securityAchieving high-fidelity security
Achieving high-fidelity security
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 

Destaque

ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
Mark Mad
 
Manufacturing
ManufacturingManufacturing
Manufacturing
sudpal88
 
Technology integration
Technology integrationTechnology integration
Technology integration
briggsad
 
Feliz dia del padre infor
Feliz dia del padre inforFeliz dia del padre infor
Feliz dia del padre infor
lissalejandra
 
Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011
sudpal88
 
Всеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРАВсеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРА
mariya776
 

Destaque (20)

NDO
NDONDO
NDO
 
Infographic: Dementia Toolkit
Infographic: Dementia ToolkitInfographic: Dementia Toolkit
Infographic: Dementia Toolkit
 
KDD Cup Research Paper
KDD Cup Research PaperKDD Cup Research Paper
KDD Cup Research Paper
 
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
 
Manufacturing
ManufacturingManufacturing
Manufacturing
 
To byod or not to byod
To byod or not to byodTo byod or not to byod
To byod or not to byod
 
Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home care
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends study
 
Technology integration
Technology integrationTechnology integration
Technology integration
 
Feliz dia del padre infor
Feliz dia del padre inforFeliz dia del padre infor
Feliz dia del padre infor
 
Traumatic Brain Injury Infographic
Traumatic Brain Injury InfographicTraumatic Brain Injury Infographic
Traumatic Brain Injury Infographic
 
The economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionageThe economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionage
 
Trias politika
Trias politikaTrias politika
Trias politika
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011
 
Asignacion iv
Asignacion ivAsignacion iv
Asignacion iv
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Dibujos
DibujosDibujos
Dibujos
 
Freedom of Choice with Home Care
Freedom of Choice with Home CareFreedom of Choice with Home Care
Freedom of Choice with Home Care
 
Всеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРАВсеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРА
 

Semelhante a Websense security prediction 2014

Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
Andreas Hiller
 
CMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docxCMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docx
mccormicknadine86
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
Yogesh Kumar
 

Semelhante a Websense security prediction 2014 (20)

Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
WP_ Five Reasons Why_Jan_2023.pdf
WP_ Five Reasons Why_Jan_2023.pdfWP_ Five Reasons Why_Jan_2023.pdf
WP_ Five Reasons Why_Jan_2023.pdf
 
WithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperWithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaper
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
CMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docxCMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docx
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Five Reasons Why You Need Cloud Investigation & Response Automation
Five Reasons Why You Need Cloud Investigation & Response AutomationFive Reasons Why You Need Cloud Investigation & Response Automation
Five Reasons Why You Need Cloud Investigation & Response Automation
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 

Mais de Bee_Ware

Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to go
Bee_Ware
 

Mais de Bee_Ware (20)

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnelles
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape report
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloud
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - Kaspersky
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industriels
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013
 
Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to go
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuelles
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santé
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cps
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - France
 
2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis
 
X force report 2013
X force report 2013X force report 2013
X force report 2013
 

Último

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Websense security prediction 2014

  • 2. Table of Contents 1 2 3 4 5 6 7 8 INTRO 2014 Security Predictions Advanced malware volume will decrease. A major data-destruction attack will happen. Attackers will be more interested in cloud data than your network. Redkit, Neutrino and other exploit kits will struggle for power in the wake of the Blackhole author arrest. Java will remain highly exploitable and highly exploited — with expanded repercussions. Attackers will increasingly lure executives and compromise organizations via professional social networks. Cybercriminals will target the weakest links in the “data-exchange chain.” Mistakes will be made in “offensive” security due to misattribution of an attack’s source. Every fall, Websense® Security Labs™ researchers predict the key threats your organization should prepare for in the coming year. They arrive at their predictions after carefully analyzing data from a number of sources. These include the core Websense technologies and security intelligence that informs our industry-leading security solutions, as well as trends in cyberthreats, technology, politics, economics and more. The following eight predictions and recommendations indicate cybersecurity professionals are in for another bumpy ride in 2014. Some of the biggest challenges will come from areas where most security providers aren’t even looking. You can use these insights to review current defenses, identify security gaps and prepare new safeguards.
  • 3. 1 Advanced malware volume will decrease. It probably sounds surprising to hear this from a cybersecurity company, but according to the real-time telemetry feeds in Websense ThreatSeeker® Intelligence Cloud, the quantity of new malware is beginning to decline. Unfortunately, this isn’t good news. Cybercriminals will rely less on high-volume advanced malware because over time it runs a higher risk of detection. They will instead use lower volume, more targeted attacks to secure a foothold, steal user credentials and move unilaterally throughout infiltrated networks. Although the volume of attacks will decrease, the risk is even greater because of the increasingly stealthy nature of threats. In many cases, a single entry point into an organization’s network is enough to build up to a complex data exfiltration attack. Further, if cybercriminals steal user credentials, they can directly access cloud services and mobility infrastructure (e.g., VPN or RDP). This access would allow criminals to establish a presence by creating new domain-level user accounts, without resorting to massive malware distribution. Recommendation Organizations can’t rely on anti-virus (AV), firewalls or other traditional security measures to save their networks. Security teams need a comprehensive security solution that not only detects malware activity, but goes a step further by detecting and protecting against anomalous activity. It’s time to transform security thinking from “setting and forgetting” to using technology that can stop threats by analyzing irregular behavior and sleuthing through the data. Stopping the most advanced, targeted attacks requires amplified information collecting that investigates threat behavior in real time.
  • 4. 2 A major data-destruction attack will happen. Most attackers historically used a network breach to steal information for profit. In 2014, organizations need to be concerned about nation-states and cybercriminals using a breach to destroy data. Ransomware — where cybercriminals hold corporate data hostage and demand a ransom be paid in exchange for its release — will play a part in this trend. In fact, the 2013 resurgence of CryptoLocker demonstrated how one small piece of malware, on a single computer, can hold an entire organization hostage by locking out network drives. This and other ransomware campaigns were just the tip of the iceberg. We expect this trend to move down market, affecting small- and medium-sized organizations. The monetary gain for ransomware can prove to be extreme, hence the continued motivation to employ this attack strategy. Unfortunately there is no guarantee that the ransomed data will be returned. Many cybercriminals collect ransom without returning the data to its rightful owner. Recommendation Make sure your organization is protected from targeted attacks, properly backs up data and segments each network. This will eliminate attacker advantage if they gain access, destroy your data or attempt to hold your sensitive information hostage. In addition, deploy a comprehensive data loss prevention (DLP) solution to enable your team to track and monitor the movement of your most sensitive data.
  • 5. 3 Attackers will be more interested in cloud data than your network. Cybercriminals will focus their attacks more on data stored in the cloud. This tactical shift follows the movement of critical business data to cloud-based solutions such as Google, Microsoft Office 365 and Confluence. They will find that penetrating the data-rich cloud can be easier and more profitable than getting through the “castle walls” of an on-premise enterprise network. No doubt, attackers will still infiltrate enterprise networks to target users, steal information and compromise their systems. However, such attacks will serve as an intermediate step to gain access to third-party cloud services instead of an internal data store. Recommendation Implement a comprehensive DLP solution that can help you identify what data is in the cloud and where it resides. Understand who is accessing your data and ensure these individuals have hardened access controls and the proper security training. In addition, make sure that the database containing your most sensitive information has extra protection.
  • 6. 4 Redkit, Neutrino and other exploit kits will struggle for power in the wake of the Blackhole author arrest. The Blackhole exploit kit was arguably the most successful in history. Everything changed in October 2013 when “Paunch,” the alleged hacker author behind the famous kit, was arrested in Russia. Websense Security Labs predicts that we will see a fight for market leadership between a number of new entrants and existing exploit kits in 2014. Similar to brick-and-mortar criminal rings, now that the kingpin is removed, others will rise in popularity and struggle for dominance. Until the arrest of Paunch, Blackhole was used in the biggest percentage of exploit activity, and for good reason: its owner was adept at staying up-to-date with the most recent vulnerabilities. Blackhole had been followed in popularity by the Cool, Gong da and Redkit exploit kits. But the exploit kit market was disrupted almost immediately — within a month of Paunch’s arrest, Blackhole had dropped from the top spot to number eight behind Redkit. To fill the void, we anticipate Redkit and the Neutrino exploit kit will secure a strong foothold in the coming year. Neutrino has incorporated Microsoft Internet Explorer zero-days very quickly and has increasingly become a Blackhole replacement. We also anticipate seeing fragmented exploit kits appear more frequently than top kits. This fragmentation will increase the volume of exploit kits that information security professionals need to monitor. Recommendation Information security professionals need to stay updated on how the exploit kit market changes in 2014. Stay tuned to the Websense Security Labs blog for the latest news on exploit kit developments: community.websense.com/blogs/securitylabs.
  • 7. 5 Java will remain highly exploitable and highly exploited — with expanded repercussions. Despite highly publicized and successful exploitations of Java vulnerabilities throughout 2013, most end points continue to run older versions of Java and therefore remain extremely exposed to exploitation.1 The situation is not expected to change in 2014. Pragmatism, not ignorance, is behind most decisions not to update Java. Patching is still an unfeasible option for many organizations, particularly those using business-critical applications that have not been updated to support more recent versions of the platform. And alternative approaches combining a variety of tactics are time-consuming for IT to design and implement. In addition, we anticipate repercussions throughout the threat landscape. These include: • With numerous proven Java exploits to choose from, cybercriminals will devote more time to finding new uses for tried-and-trusted attacks or to crafting other aspects of their advanced, multi-stage attacks.2 • Cybercriminals will look elsewhere for similarly exploitable opportunities. Our researchers are paying particular attention to Flash, web-kits and several other popular platforms that, like Java, are popular, readily exploited and inconsistently updated. • Cybercriminals will reserve the use of zero-day Java exploits for targeting high-value networks with good Java patching practices. Recommendation To balance business needs with enterprise security requirements, the best practices are to blend tactics. Patch, uninstall Java when it isn’t required, and implement the “alternative browser” approach. The alternative browser approach dedicates machines and browsers for the use of Java-based applications and all others are kept secure against Java vulnerabilities. In addition, deploy comprehensive and integrated cybersecurity solutions. 1 Websense Security Labs blog, 9/5/13, “New Java and Flash Research Shows a Dangerous Update Gap,” http://wb-sn.com/16p9YPz 2 Learn more about The Seven Stages of Advanced Threats at www.websense.com/sevenstages.
  • 8. 6 Attackers will increasingly lure executives and compromise organizations via professional social networks. During the first stage of the advanced threat kill chain, cybercriminals conduct reconnaissance to gather intelligence on their potential victims.3 In 2014, attackers will increasingly use work-oriented social networks, such as LinkedIn, instead of personal social media (e.g., Facebook) when targeting professionals. The information gathered this way will be used to compromise networks. We predict many of the cybercrime tactics that are successful when targeting personal social networking users will be applied in new, innovative ways within professional social networks. For example, in October 2013, Websense Security Labs researchers discovered a false LinkedIn profile that pinpointed targets for an upcoming phishing campaign.4 A fake user named “Jessica Reinsch” contacted specific LinkedIn users chosen for their job title, company size and other information. Cybercriminals then lured these contacts to endorse the counterfeit account and visit their malicious website. This added creditability for the fake profile and provided attackers with insight into each target’s professional network. Recommendation Networking is a powerful business tool. Unfortunately, it can provide cybercriminals access to a professional’s social connections and a direct communication channel to deliver malware. To avoid becoming a victim of socially engineered cyberattacks, members of LinkedIn and other professional social networks need to be wary of those attempting to connect with them. Verify a legitimate relationship before adding connections and determine why this person wants to interact. In addition, as a best practice, educate your workforce about the reconnaissance stage of the advanced threat kill chain.5 3 Learn more about the advanced threat kill chain at www.websense.com/sevenstages. 4 Websense Security Labs blog, 10/31/13, “LinkedIn Lure Looking for Love-ly Profiles, Possibly More,” http://wb-sn.com/1b6yO8y. 5 See again at www.websense.com/sevenstages.
  • 9. 7 Cybercriminals will target the weakest links in the “data-exchange chain.” Many high-value government and enterprise targets, after years of being hacked or attacked, have significantly improved their defensive strategies and capabilities. Cybercriminals will therefore increasingly go after the contractors, vendors and others that comprise the “data-exchange chain” with the larger, more valuable targets — for fewer of these partners have sufficient defenses. Any organization in the data-exchange chain is a potential target or can serve as a means of attacking the “big prize.” As transactions move from using physical currency to digital forms such as “electronic wallets,” the number of organizations in the data-exchange chain will continue to grow. Cybercriminals could go after any organization in the chain that collects, processes, records, or bills any part of these transactions. Recommendation You need to understand the extent of your organization’s data flow and ensure it is protected at every stop along the way. Examine what security measures your partners are taking and ask questions based on the nature of your relationship and the business function they perform. In addition, develop criteria for email, web, data, and cloud security measures that you expect your vendors and partners to have in place.
  • 10. 8 Mistakes will be made in “offensive” security due to misattribution of an attack’s source. For several years, we’ve been hearing more about “offensive” security, where global governments and enterprises have been threatening retaliatory strikes against anyone caught attacking them or their interests. As in traditional warfare, tactical mistakes will increasingly happen in these cybertrenches. Security teams might feel justified in mounting counter-cyberattacks in response to harmful incoming incidents, but the reality is that correctly attributing an attack’s true source is exceptionally difficult even for the most experienced experts. Failure to accurately identify the perpetrator could trigger a retaliatory strike against the owner of a compromised website commandeered in the attack. As a result, the innocent organizations caught in the crossfire will suffer varying and potentially grave consequences. Other repercussions are less clear but still potentially impactful. Attacks that hit undeserving targets might result in numerous lawsuits among affected parties, and the lack of legal precedent in this realm could delay or prevent timely resolution. Recommendation Never hack back, because offensive attacks do more harm than good. Instead, adopt a robust incident response and security triage program to collect as much forensic information as possible before passing it on to internal teams or trusted third parties. The more information you can gather at this stage, the better. In addition, improve your organization’s attack-prevention defenses by adding real-time defenses that correlate with the advanced threat kill chain.6 6 See again at www.websense.com/sevenstages.
  • 11. About Websense Websense, Inc. is a global leader in protecting organizations from the latest cyber attacks and data theft. Websense TRITON® comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. Tens of thousands of enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance- and cloud-based Websense TRITON solutions. Websense TRITON stops more threats; visit www.websense.com/proveit to see proof. To access the latest Websense security insights and connect through social media, please visit www.websense.com/smc. For more information, visit www.websense.com and www.websense.com/triton. © 2013 Websense, Inc. All rights reserved. Websense, TRITON and the Websense logo are registered trademarks of Websense, Inc. in the United States and various countries. All other trademarks are the properties of their respective owners. SecPredRep 11/14/13