Ransomware likely migrate beyond computers in 2017
DUBAI, January 5, 2017
This could be the year in which the ruthless threat of ransomware migrates to other platforms beyond computers and smartphones, whose primary purpose is not data processing or digital communications, a report said.
Eset, a leader in security software and protection products, has published a paper titled “Eset Trends for 2017: Holding security ransom” based its constant monitoring of the global threat landscape and the search for patterns necessary to understand its next moves and possible evolution.
Eset has anticipated the coming trends in terms of threats and cybersecurity, combing through the main events to analyze how cybercrime will shape itself in the near future.
The structure of the report follows previous editions, with eight of our researchers examining the speed at which new technologies emerge and attack surfaces widen. In this context, we consider where security risks will migrate and what companies, experts, governments and users can do to face them.
Smart devices will not be the only viable targets acquired through the internet: attackers will surely use it to probe critical infrastructure and will continue to look for ways to cause damage, deny service, or hold data hostage.
Attacks on critical infrastructure, which Cobb and Cameron Camp analyze in a section of the report, relate to the compromise of data and services that are essential for systems related to physical, economic or national security. In short: those vital for the everyday stability and development of a society.
And if we talk about things that are vital, what could be more important than protecting the systems that support the functioning of the healthcare industry? As it becomes increasingly computerized, more practitioners and patients are using internet-connected medical and fitness devices that are full of sensitive information. However, security and privacy are often an afterthought, explains Lysa Myers in her section, indicating that the future of healthcare will possibly continue to bring significant challenges.
There is another sector where device integration is increasingly common: videogames. Cassius Puodzius describes the potential risks of integrating consoles with computers, in a system that is increasingly internet-dependent and could lead to the exploitation of vulnerabilities, or malware infections aimed at stealing personal, financial and even the game play information of gamers.
It is true that the exploitation of vulnerabilities will continue to be an important attack vector, just as it has always been, but we should not lose sight of the trend in this regard. Lucas Paus points out that although the number of vulnerabilities reported in 2016 does not yet equal the number recorded in 2015, nearly 40 per cent are critical – and this is a larger proportion than in previous years. So why are there fewer flaws reported, but more of them proving critical, and what does this mean? In this section, we analyze this paradox and the consequences it might have.
Finally, among the various topics covered, we discuss the reality of mobile malware in the context of unstoppable technological developments, which imply new attack scenarios. The truth is that the rise of virtual reality technology raises new security risks that affect not only digital information, but also users’ physical wellbeing. While these applications collect and store increasingly sensitive data, mobile malware is constantly growing and becoming more complex, therefore reinforcing the importance of, and need for, safe development practices.
Trends 2017: Security held ransom, also details the factors that introduce difficulties to the implementation of internationally effective legislation on cybersecurity. Although significant regulations exist, state-level actors, companies and citizens around the world still face many challenges, as Miguel Mendoza analyzes in his section.
As for the anti-malware industry itself, David Harley highlights the current view that assumes a split between “traditional” malware detection and “next-generation” signature-less detection, tearing down the myths around the latter.
Vulnerabilities in systems and … in people?
There is an element that cuts through all of these topics. It’s a need that’s bigger than ever and vital to users, companies and vendors in understanding current and future risks, and furthermore, draws attention to the fact that in the era of connectivity, a significant change of mindset is needed.
The common denominator across all sections of the report is the human factor. “Consequently, we need to keep working until people stop being the weakest link. If we don’t, we will remain at a stage in which we have users using latest generation technology, but with security concepts from decades before,” says the report.
“It’s not just about educating the end user; governments need to adopt legislative frameworks that promote cybersecurity issues ranging from providing formal education on security issues, to properly protecting critical infrastructure. In this sense, it is also imperative that businesses commit to carrying out proper information security management and that developers do not prioritize usability over the security of their products,” Eset says in the report. – TradeArabia News Service