Research: Web, Windows Vista Threats To Rise While Adware Declines In 2008

McAfee Inc. recently released its Top 10 predictions for security threats in 2008. Researchers at McAfee Avert Labs expect an increase in Web dangers and threats targeting Microsoft Corp.'s Windows Vista operating system, among other new or increased threats. At the same time ad-serving software known as adware is expected to continue to decrease.

"Threats are increasingly moving to the Web and migrating to newer technologies such as VoIP and instant messaging," said Jeff Green, senior vice president of McAfee Avert Labs and product development. "Professional and organized criminals continue to drive a lot of the malicious activity. As they become increasingly sophisticated, it is more important than ever to be aware and secure when traversing the Web."

McAfee Avert Labs' Top 10 security threats for 2008:

Bull's Eye on Web 2.0. Compromises and malware at Salesforce.com, Monster.com and MySpace, among others, represent a new trend in attacking online applications and social networking sites. Attackers are using Web 2.0 sites as a way to distribute malware and are data mining the Web, looking for information people share to give their attacks more authenticity. McAfee Avert Labs expects a large increase in this activity in 2008.

Botnets Follow The Storm. With a handful of high-profile prosecutions of bot herders in 2007, criminals will be seeking better ways to cover their tracks. The Storm Worm set a worrying precedent. Also known as Nuwar, the Storm Worm has been the most versatile malware on record. The creators released thousands of variants and changed coding techniques, infection methods and social engineering schemes far more than any other threat in history. Storm created the largest peer-to-peer botnet ever. McAfee Avert Labs expects others will ride the coattails of that questionable success, pushing up the number of PCs turned into bots. Bots are computer programs that give cyber crooks full control over PCs. Bot programs typically get installed surreptitiously on the PCs of unknowing computer users.

IM = Instant Malware. The scenario of a "flash" worm via instant messaging applications has been foreshadowed for years. This threat could reach millions of users around the globe in a matter of seconds. There has been malware that spreads via IM, but we have yet to see such a self-executing threat. However, this may be closer than ever as the number of vulnerabilities in popular instant messaging applications more than doubled in 2007 compared to 2006. More importantly, there were 10 high-severity risks in 2007, compared to none in 2006. Additionally, the top IM virus families of 2005 and 2006 were replaced with new active threats, signifying an out with the old and in with the new milestone. Skype saw its first batch of worms in 2007. Many more are expected to follow.

Target: Online Gaming. The threat to virtual economies is outpacing the growth of the threat to the real economy. As virtual objects continue to gain real value, more attackers will look to capitalize on this. The evidence is already there. The number of password-stealing Trojans that targeted online games in 2007 grew faster than the number of Trojans that target banks.

Vista Joins The Party. In 2008, Windows Vista is set to gain additional market share and cross the 10 percent barrier. The release of Service Pack 1 for Vista is also likely to accelerate the adoption of the Microsoft operating system. As Vista becomes more prevalent, attackers and malware authors will start in earnest to explore ways to circumvent the operating system's defenses. There were 19 Vista vulnerabilities reported since its release earlier this year. McAfee Avert Labs expect a lot more Vista vulnerabilities to be reported in 2008.

Adware Continues Its Decline. The government crackdown against purveyors of ad-serving software has had a positive effect. The combination of lawsuits, better defenses, and the negative connotation associated with this form of advertising helped start the decline of adware in 2006. This trend was confirmed in 2007 and with the major players out of the game, adware is expected to continue its decline in 2008.

Phishers Catch A Wider Net. Cybercrooks will increasingly target smaller, less-popular sites with data-thieving phishing scams. It has become tougher and riskier to target top-tier sites as the big-name brands are responding more quickly and providing increased security. Knowing that a large percentage of people reuse their usernames and passwords, less popular sites are likely to be targeted more frequently than before, giving criminals the same access.

Parasitic Crimeware Takes Root. Parasitic infectors are viruses that modify existing files on a disk, injecting code into the file where it resides. While crimeware was storming ahead in recent years, parasitic malware faded to the background. In 2007 several crimeware authors turned old school to deliver threats like Grum, Virut, and Almanahe; parasitic viruses with a monetary mission. The number of variants of an older parasitic threat, Philis, grew by more than 400 percent, while over 400 variants of a newcomer, Fujacks, were cataloged. McAfee Avert Labs expect a continued interest in parasitics from the crimeware community, with overall parasitic malware expected to grow by 20 percent in 2008.

Virtualization Transforms Information Security. Security vendors will embrace virtualization to create new, more resilient defenses. Today's complex threats will be easily defeated, but researchers, professional hackers, and malware authors will begin looking at ways to circumvent the new defensive technology, continuing the classic game of cat and mouse.

VoIP Attacks To Rise 50 Percent. Already this year, more than double the number of security vulnerabilities have been reported in Voice over IP applications, compared to all of 2006. We have also seen several high-profile "Vishing" attacks and a "phreaking" conviction. It is clear that VoIP threats have arrived and there's no sign of a slow down. The technology is still new and defense strategies are lagging. McAfee Avert Labs expects a 50 percent increase in VoIP-related threats in 2008.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3