home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   COFFEE_KLATSCH      Gossip and chit-chat echo      2,835 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,689 of 2,835   
   Roger Nelson to All   
   Security in 2017   
   21 Jan 17 14:39:53   
   
   Security in 2017: Ransomware will remain king   
       
   Posted December 14, 2016 by Malwarebytes Labs   
       
   2016 was the year of ransomware, with hackers focusing their attention on   
   exploiting Internet users and businesses around the world for profit.   
   According to the FBI, cyberextortion losses have skyrocketed and ransomware   
   was on track to become a $1 billion a year crime in 2016.   
       
   Our research shows no sign of this security nightmare slowing down in 2017.   
   Hackers are becoming more advanced, and ransomware remains an incredibly easy,   
   lucrative way for them to make money. Unfortunately, the security community   
   has only started to develop defenses that can protect Internet users from   
   ransomware.   
       
   With the new year around the corner, security researchers at Malwarebytes Labs   
   have compiled a list of predictions that encompass what new ransomware   
   threats, developments, and opportunities they expect consumers and businesses   
   will face in 2017.   
       
   Ransomware will become personal.   
       
    Most ransomware attacks today are indiscriminant. For the most part, cyber   
   criminals issue ransomware at random, hitting anyone and everyone that they   
   can. However, it's increasingly likely that targeted ransomware attacks will   
   become the new norm. If an attacker can recognize the difference between an   
   enterprise and a consumer target, they will be able to adapt their ransom   
   demands to match their victims. The intentions of attacks are also likely to   
   become more personal. In addition to encrypting files, ransomware attackers   
   will soon be threatening to post data or information on social media, or to   
   expose it in an equally destructive way. As with most cyber attacks,   
   ransomware will grow to take advantage of more human vulnerabilities.   
       
   Ransomware protection will become an investment.   
       
   Until this past year, companies and consumers had few solutions available to   
   them to help detect and fight ransomware. Security researchers have been   
   working hard to find decryptors of specific ransomware types so that they can   
   effectively protect against them in the near future. However, when a   
   ransomware descriptor is recognized, ransomware authors often tweak their   
   attacks to avoid detection. As this cat and mouse game between security   
   researchers and ransomware creators continues, more security vendors will   
   debut anti-ransomware protection offerings. In fact, we predict that by the   
   end of 2017 at least 50% of security companies will release some sort of   
   ransomware detection and/or prevention software. Companies and consumers will   
   both find themselves investing in new anti-ransomware security software in   
   2017.   
       
   Password managers will become a huge target.   
       
   In 2017, password managers, digital vaults where users store passwords and   
   other authentication data, will become a huge target for cybercriminals. In   
   fact, just last month, it was revealed that Apple's new iOS 10 operating   
   system has a potential security hole that could help hackers get access to   
   passwords and other sensitive information. Hackers are apparently able to   
   infiltrate Apple's Keychain password manager. For a hacker, breaking into a   
   network such as this can be incredibly fruitful. The top password managers are   
   likely to find themselves under attack in 2017.   
       
   Attackers will pick pocket the digital wallet.   
       
   With the growth of financial and budget planning applications; increased   
   pervasiveness of new payment methodologies such as Apple Pay adding new   
   wrinkles (such as making online payments through the phone); and the growing   
   pervasiveness of cryptocurrencies (like Bitcoin, Litecoin, and Peercoin),   
   there will be increasing attacks against applications, plugins, digital   
   wallets, and the companies holding authentication data allowing access to   
   these digital currency streams. With the incremental adoption of each of these   
   technologies, the potential windfall from a dedicated attacker increases. Soon   
   it will be more than enough to attract organized criminals who previously   
   flocked to the banking Trojans of the past. In fact, the first attacks may   
   evolve from the original Zeus source code, the granddaddy of banking Trojans.   
       
   A new exploit kit will emerge as the top dog.   
       
   In recent months, we have witnessed several trends that hint that existing   
   malware attacks are going "back to the basics." For example, there has been a   
   rise in the spread of malware attacks through email and phishing, while more   
   sophisticated malvertising and exploit kit attacks have decreased. Companies   
   and consumers have figured out how to block Java and Flash and are moving to   
   HTML5, making it harder for the existing exploit kits to succeed in deploying   
   malware through malvertising.   
       
   Since Angler EK disappeared in June 2016, several other exploit kits have been   
   battling for the top spot. An underdog, RIG EK is now positioned to be the new   
   leader, but it still relies on older vulnerabilities, all of which are easily   
   prevented today. This opens up a massive opportunity for a new, sophisticated   
   and dangerous exploit kit to emerge in the next year.   
       
   Malware will become engrained in tech support scams and attacks will increase,   
   globally.   
       
   Tech support scams (TSS) have become incredibly advanced and dangerous over   
   the last few years and most recently we have witnessed TSS deploying malware,   
   and even extortionware. In 2017, TSS attackers will dive into this benefit   
   headfirst and leverage the malware threat landscape more than ever before.   
       
   The IoT will thrust DDoS attacks into a new era.   
       
   In 2017, the Internet of Things (IoT) will perpetuate an evolution in how DDoS   
   attacks are orchestrated. In September of 2016, we saw a DDoS attack like   
   never before. Security blogger Brian Krebs found himself under attack by the   
   biggest DDoS attack ever recorded, and sources emphasized that CCTV cameras   
   wired to the Internet and other unsecured connected devices were leveraged by   
   attackers to orchestrate the attack. Based on the sheer volume of devices that   
   we have connected to the Internet today, the very real challenge of not being   
   able to update or secure their firmware and the ease in which these devices   
   can be identified using both general (Google) or specialized (Shodan) search,   
   the possibilities for DDoS attackers have exploded. We anticipate that we will   
   see increasing attacks like the one that targeted Krebs, perhaps even   
   targeting critical infrastructure such as the power grid or government   
   communications   
       
   Security will be the #1 priority for the boardroom.   
       
   In 2017, we anticipate that more security professionals will be asked to join   
   company boards. The need to have someone technical with a background in   
   security on your board is currently at an incredibly hire premium-across all   
   industries. This will only continue to grow over the next year, as we continue   
   to watch it evolve as one of the top business and political priorities of our   
   age.   
       
       
   Regards,   
       
   Roger   
      
   --- DB 3.99 + W10 (1607)   
    * Origin: NCS BBS - Houma, LoUiSiAna (1:3828/7)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca