Page 5 - Cyber Warnings
P. 5







filters do not act against such files, there has been a sharp increase in these attacks. The weak
point of this attack is that the users must enable macros, yet cybercriminals have found ways
around this, by successfully developing some ingenious social engineering techniques.

One example, discovered by PandaLabs, was a Word document containing a blurred image. At
the top of the document in bold capital letters there was a message that indicated that the image
was blurred for security reasons. If the user wanted access to the information, they had to
enable the macros, with an arrow pointing to the button to be pressed.

Once enabled, it showed you the clear image while simultaneously infecting you with a type of
Cryptolocker.


2016: What Can We Expect?

Exploit Kits: These will continue to be the favored tool of cybercriminals, when looking to
achieve massive infections. Exploit kits can be bought on the black market, and come with
updates, allowing attackers to find new victims. Many security solutions still aren’t capable of
effectively combatting this type of attack, resulting in a high success rate for attackers.

Malware: The number of new malware samples will keep rising. Although the majority of
samples will continue to be Portable Executable (PE) types, we foresee a growth in non-PE
malware, mainly scripts. It won’t just be the well-known JavaScript, but rather a growth in the
use and abuse of PowerShell, a tool that comes by default with Windows 10, which allows for
the running of all types of scripts.

It will combine itself with known attacks such as Fileless Attacks, where, instead of the malicious
code being on a physical file on the computer, it will be a parameter in the execution of a
command, or an entry in the registry that contains the script to be executed.

Targeted Attacks: There will be a growth in targeted attacks. The use of rootkit techniques,
which allows the attack to hide itself from the view of the operating system. Companies will be
obliged to take security measures to be protected against these attacks, as they can seriously
damage the company, both financially and in terms of reputation. These attacks steal both
confidential company data, (financial data, strategic plans, etc.) and that of their clients.

Malware for Android: Malware for mobile devices will increase, especially for Android, the
most popular operating system on the market. We will see that more threats will root the device,
meaning that eliminating it will be nearly impossible for antiviruses, except for those that come
installed from the factory.

Mobile Payment Platforms: It is still unclear if 2016 will be the year in which these platforms
become truly popular, but what we do know is as their use increases, so will attacks from
cybercriminals. If any of the platforms become the first to break through, it will become a prime
candidate for attackers looking for any weakness that they can abuse in the system.




5 Cyber Warnings E-Magazine – March 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   1   2   3   4   5   6   7   8   9   10