Businesses Increasingly Under Attack From Cyber-Security Threats

SonicWALL, Inc., provider of intelligent network security and data protection solutions, recently issued its mid-year cyber-threat intelligence bulletin. The bulletin reveals that businesses are increasingly under attack by cyber-criminals who seek to exploit employees connecting to corporate networks via mobile devices and their rising use of social media. Growth in Android-based malware and social media scams such as click-jacking on Facebook and malicious links sent over Twitter are creating new and heightened levels of business vulnerability from data intrusion, theft and loss. Productivity and profitability are also compromised due to network and application downtime. Data for the bulletin was sourced from the SonicWALL Global Response Intelligent Defense (GRID) Network, which gathers, analyzes and correlates billions of dynamic, real-time global cyber-threats. 

“Cyber-criminals are focusing their attention on penetrating corporate networks and data through mobile workflow and applications. Employees innocently surfing dating sites via a mobile device or PC, that are in fact fake sites, or clicking on offers on Facebook such as a free McDonald’s meal that are click-jacking scams, can have a catastrophic impact on data security, business continuity and profitability," said Boris Yanovsky, SonicWALL vice president of software engineering. Yanovsky added, “New levels of network and firewall security are needed to protect against these increasingly sophisticated and prolific threats. Advanced networking security technologies such as application intelligence and control, real-time data visualization, intrusion prevention and malware protection, all of which are available in SonicWALL’s Next-Generation Firewalls, deliver this protection.”

Key findings of the mid-year cyber-threat intelligence bulletin include:

• Mobile-based threats have risen significantly over the last six months. While these threats are not as widespread as computer-based threats, cybercriminals have found workarounds to attack mobile phones on any platform. Threats that infiltrate mobile devices via popular applications like Apple Safari and Adobe Reader can attack multiple operating systems. Also, the small screens of mobile devices typically truncate the view of long URLs, giving hackers an opportunity to lure unsuspecting users to a fake site masquerading as the site of a trusted institution.

• Android Market malware is a growing issue. With the growth of the Android Market, there has been an increase in rogue applications affecting thousands of users. Google is actively removing malicious applications that appear in the market and has also removed multiple malicious apps remotely from users’ mobile devices. However, some threats remain.

• Security threats resulting from the use of social media continue to rise. As social media has become part of the fabric of social and work-life, constant access to sites by employees from the corporate network is creating new levels of vulnerability. Click-jacking scams lead to surveys that generate income for the hackers and rogue apps compromise confidential information. Twitter messages can contain shortened malicious links that can even activate just by hovering over them. Email attacks on popular sites emulate the “look and feel” of these sites to produce very credible-looking scams.

• The U.S., Canada and Taiwan are the most heavily hit countries for worldwide threat-related traffic. In addition, the U.S., China, India and Korea lead in intrusion-related and multimedia threats. A snapshot of the top 10 most heavily hit countries may be viewed here.

• New and familiar viruses continue to infect computers and networks worldwide. Top malware threats in the first half of 2011 were fake anti-virus malware, including a new variant consisting of fake desktop utilities, SpyEye and Zeus trojan spams. “Poisoned” search results continue to deliver active malware, and every new variant is repackaged to evade anti-virus detection. Malicious code and spam often masquerade as Facebook status updates, or email and security updates from Microsoft, while BredoLab and Oficla trojan spams masquerade as tracking and invoice sites from shipping companies such as FedEx, UPS, DHL and USPS. For a list of the top intrusions, malware as well as important gateway and anti-virus signatures that protected against these threats for the first half of 2011, click here.

• Phishing fraud is more sophisticated and difficult to detect. Phishers have reduced errors and improved the quality and content of their emails, and they are now able to produce web sites that look entirely legitimate, with multiple redirections masking the deception. Blended threats that combine techniques such as data theft and malware installation are also more prevalent. SonicWALL continuously updates its list of institutions likely to be targets of spoofing attacks intended to harvest usernames, passwords and other sensitive customer information. An updated list of organizations that have been spoofed over the last six months is available here.

• Most dangerous threats over the last six months include advanced persistent threats that come in through clicked links, lie hidden for an indefinite period of time and become active at a predefined time. Also highly dangerous are institutional database breaches, which expose a wealth of data for criminal use by correlating data from more than one source, providing the basis for sophisticated attacks such as spear phishing (targeted phishing) and threats to SCADA-based systems.

• Most widespread threats. The most active category continues to be FakeAV, which uses the latest trends and news stories to target a large user base, serving OS-specific and location-specific malware. Spam continues to be widespread, with large flows of emails carrying virus-laden attachments; pitches for weight loss products, wristwatches, and pornographic services and products; “nuisance” spam that has no content other than three or four random characters; and image-only spam.

Featured

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.