Study: Growth In Social Networking, Mobile and Infrastructure Attacks Threaten Corporate Security In 2011

IID (Internet Identity), a provider of technology and services that help organizations secure Internet presence, recently released its list of the top enterprise security trends for 2011. Some specific areas that IID predicts significant spikes in attacks are social networking, mobile, and enterprise infrastructure. Below is the IID list of its top enterprise security risks to watch out for in 2011 (in no particular order):

1) Bank-Oriented Social Networking Attacks. With the growth of social networks, banks are getting on the bandwagon and using these networks to cater to their customers. But beware, there will be fakes that will utilize social networking sites like Twitter and Facebook to try to infect victims with malware and trick people into giving up their vital personal information like bank logins, social security numbers, etc.

2) Mobile Malware. Cyber crooks will cash in on the app craze even more in 2011, targeting mobile phones for malicious software (malware) attacks. They have already figured out ways to disguise malware as legitimate apps, and then steal account and login information or get victim phones to make expensive phone calls without the phone's owner ever knowing a thing. IID expects to see more and more rogue apps, along with attacks crafted to go after vulnerabilities in the smart phones’ operating systems or popular apps.

3) Infrastructure Hijackings. Expect DNS (Domain Name System) and BGP (Border Gateway Protocol) attacks to grab headlines in 2011. As the translator between domain names and IP addresses, DNS is the glue that holds everything together on the Internet, from keeping time to conducting transactions to transmitting messages to sharing corporate and consumer data. By hijacking these DNS translations, attackers can drive unsuspecting surfers and corporate users to malicious sites, making large parts of the Internet largely useless or insecure. BGP is essentially the routing system for the Internet. Much like DNS, when BGP is hijacked, everything from websites to e-mail to instant messages can be rerouted.

4) Growing Pains with DNSSEC. There will be problems implementing DNSSEC (Domain Name System Security Extensions) properly because of technical challenges, industry resistance to change and implementation problems. DNSSEC is being marketed as the silver bullet to stop DNS cache poisoning attacks -- where criminals can hijack a domain, email and much more.

5) Zeus Reborn. The person who wrote Zeus -- the malicious software used to steal more than $100 million so far in 2010 – says he is retiring from using Zeus. But don't believe the ruse. There is a good chance the programmer or a close associate will soon emerge with even more powerful ways to steal.

6) Sophisticated Mule Recruitment. In the world of phishing, a mule -- or money mule, to be more precise -- is the person who does the legwork of transferring the money from a phished bank account to a foreign bank account, typically through an intermediary money wire system like Western Union. IID expects more sophisticated mule recruiting operations in the coming year since moving money has been the biggest obstacle to criminals cleaning out bank accounts over the past year.

7) ACH Fraud Growth. Cyber criminals have found ACH (Automated Clearing House) fraud to be a simple way to swindle money from users. IID sees this scheme continuing for the foreseeable future due to its simplicity and the criminals’ ability to make millions of dollars from just a handful of ACH fraud victims.

8) Law Enforcement Busts. There has been a lot of money and manpower invested into fighting cybercrime by U.S. federal law enforcement as well as other countries over the past few years. Expect a continued uptick in taking cybercriminals down over the next year.

9) Extended Enterprise Problems on the Rise. Cyber criminals often take an indirect approach to compromise their targets by focusing on those targets’ trusted partners, vendors and others (the Extended Enterprise) that have access to valuable data. As enterprises strengthen their defenses against direct attacks, IID expects to see an increase in indirect attacks against the Extended Enterprise – essentially opening up a “back door” security vulnerability.

10) Malvertising Growth. Malvertising, the distribution of malware via fake online ads, grew steadily in 2010 with the volume of detected incidents more than quadrupling over the year. IID expects this growth to continue, as cybercriminals capitalize on the rapid growth in online advertising and compromised websites to distribute malware.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3