Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities: Research Paper download: Join the Mission!
April 14, 2016

security.jpgFacing Internet Security Threats


++ Action Item: Please review the background note below about the latest threats and security trends and then download the Symantec Internet Security Threat Report (ISTR), an overview and analysis of the year in global Internet threat activity.


Executives/organizations interested in working with CATAAlliance to help advance our competitive Innovation Nation Campaign in the area of advanced security and public safety leadership should contact Kevin Wennekes at kwennekes@cata.ca


Also stay tuned for a TechNOW interview with Symantec executive(s) on the topic of " What can you do to improve your security posture? "


The interview will be part of a new Video Sharing Channel to define the challenges and identify the traits and approaches required by CXO’s for successful transformational leadership.


Background:


Download full Report: https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf


Every Week in 2015, Twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities

  • Symantec Report Reveals a Record Nine Mega Breaches;

  • Half a Billion Personal Records Stolen or Lost in 2015;

  • Crypto-ransomware Attacks Grew by 35 Percent

Symantec’s (Nasdaq: SYMC) Internet Security Threat Report (ISTR), Volume 21, reveals an organizational shift by cybercriminals: They are adopting corporate best practices and establishing professional businesses in order to increase the efficiency of their attacks against enterprises and consumers. This new class of professional cybercriminal spans the entire ecosystem of attackers, extending the reach of enterprise and consumer threats and fueling the growth of online crime.

“Advanced criminal attack groups now echo the skill sets of nation-state attackers. They have extensive resources and a highly-skilled technical staff that operate with such efficiency that they maintain normal business hours and even take the weekends and holidays off,” said Kevin Haley, director, Symantec Security Response. “We are even seeing low-level criminal attackers create call center operations to increase the impact of their scams."

Advanced professional attack groups are the first to leverage zero-day vulnerabilities, using them for their own advantage or selling them to lower-level criminals on the open market where they are quickly commoditized. In 2015, the number of zero-day vulnerabilities discovered more than doubled to a record-breaking 54, a 125 percent increase from the year before, reaffirming the critical role they play in lucrative targeted attacks. Meanwhile, malware increased at a staggering rate with 430 million new malware variants discovered in 2015. The sheer volume of malware proves that professional cybercriminals are leveraging their vast resources in attempt to overwhelm defenses and enter corporate networks.

Over Half a Billion Personal Records Stolen or Lost in 2015

Data breaches continue to impact the enterprise. In fact, large businesses that are targeted for attack will on average be targeted three more times within the year. Additionally, we saw the largest data breach ever publicly reported last year with 191 million records compromised in a single incident. There were also a record-setting total of nine reported mega-breaches. While 429 million identities were exposed, the number of companies that chose not to report the number of records lost jumped by 85 percent. A conservative estimate by Symantec of those unreported breaches pushes the real number of records lost to more than half a billion.

“The increasing number of companies choosing to hold back critical details after a breach is a disturbing trend,” said Haley. “Transparency is critical to security. By hiding the full impact of an attack, it becomes more difficult to assess the risk and improve your security posture to prevent future attacks.”

Encryption Now Used as a Cybercriminal Weapon to Hold Companies’ and Individuals’ Critical Data Hostage

Ransomware also continued to evolve in 2015, with the more damaging style of crypto-ransomware attacks growing by 35 percent. This more aggressive crypto-ransomware attack encrypts all of a victim’s digital content and holds it hostage until a ransom is paid. This year, ransomware spread beyond PCs to smartphones, Mac and Linux systems, with attackers increasingly seeking any network-connected device that could be held hostage for profit, indicating that the enterprise is the next target.

Don’t Call Us, We’ll Call You: Cyber Scammers Now Make You Call Them to Hand Over Your Cash

As people conduct more of their lives online, attackers are increasingly focused on using the intersection of the physical and digital world to their advantage. In 2015, Symantec saw a resurgence of many tried-and-true scams. Cybercriminals revisited fake technical support scams, which saw a 200 percent increase last year. The difference now is that scammers send fake warning messages to devices like smartphones, driving users to attacker-run call centers in order to dupe them into buying useless services...


About CATAAlliance


Interact with your Innovation Peer Group Now http://www.linkedin.com/groups/Canadian-Advanced-Technology-Alliance-CATA-37239/about


The Canadian Advanced Technology Alliance (CATAAlliance) is Canada's One Voice for Innovation Lobby Group, crowdsourcing ideas and guidance from thousands of opt in members in moderated social networks in Canada and key global markets. (No Tech Firm Left Behind) Contact: CATA CEO, John Reid at jreid@cata.ca