Intel® Security has released its McAfee Labs‘ November 2014 Threats Report, including an analysis of threat activity in the third quarter of 2014, and the organisation’s annual 2015 Threats Predictions for the coming year. The report details a third quarter filled with threat development milestones and cyber events exploiting long-established Internet trust standards. McAfee Labs forecasts a 2015 threat landscape shaped by more attacks exploiting these standards, new attack surfaces in mobile and Internet of Things (IoT), and increasingly sophisticated cyber espionage capabilities, including techniques capable of evading sandboxing detection technologies.
In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the quarter and overall malware surging by 76 percent year over year. The researchers also identified new attempts to take advantage of Internet trust models, including secure socket layer (SSL) vulnerabilities such as Heartbleed and BERserk, and the continued abuse of digital signatures to disguise malware as legitimate code.
Featured Download: Social media access at work. Do your employees know the rules?
In 2015, McAfee Labs predicts malicious parties will seek to extend their ability to avoid detection over long periods, with non-state actors increasingly adopting cyber espionage capabilities for monitoring and collecting valuable data over extended targeted attack campaigns. The researchers predict more aggressive efforts to identify application, operating system, and network vulnerabilities, and an increasing focus on the limitations of sandboxing technologies as hackers attempt to evade application- and hypervisor-based detection.
“2014 saw a huge range of high profile industry attacks, which undoubtedly shook confidence in long-standing Internet trust models, consumer confidence in organisations’ abilities to protect their data, and organisations’ confidence in their ability to efficiently detect and respond to targeted attacks in a timely manner. As we move into 2015, it is vital that moves are taken to restore trust. In order to do this, we need to implement new security postures that shrink time-to-detection through the superior use of threat intelligence data, as well as continue working closely with public sector in dismantling cybercriminal operations. Ultimately, we need to get to a security model that’s built-in by design, seamlessly integrated into every device at every layer of the computing stack” said Raj Samani, EMEA Chief Technology Officer, Intel Security.
McAfee Labs foresees the following trends in 2015:
1. Increased use of cyber warfare and espionage tactics. Cyber espionage attacks will continue to increase in frequency as long-term players become stealthier information gatherers and newcomers to cyber-attack capabilities look for ways to steal sensitive information and disrupt their adversaries.
o Established nation-state actors will work to enhance their ability to remain hidden on victim systems and networks.
o Cybercriminals will continue to act more like nation-state cyber espionage actors, focusing on monitoring systems and gathering high-value intelligence on individuals, intellectual property, and operational intelligence.
o McAfee Labs predicts that more small nation states and terror groups will use cyber warfare.
2. Greater Internet of Things attack frequency, profitability, and severity. Unless security controls are built-in to their architectures from the beginning, the rush to deploy IoT devices at scale will outpace the priorities of security and privacy. This rush and the increasing value of data gathered, processed, and shared by these devices will draw the first notable IoT paradigm attacks in 2015.
o The increasing proliferation of IoT devices in environments such as health care could provide malicious parties access to personal data even more valuable than credit card data. For instance, according to the McAfee Labs report entitled Cybercrime Exposed: Cybercrime-as-a-Service, the cybercrime community currently values stolen health credentials at around $10 each, which is about 10 to 20 times the value of a stolen U.S. credit card number.
3. Privacy debates intensify. Data privacy will continue to be a hot topic as governments and businesses continue to grapple with what is fair and authorised access to inconsistently defined “personal information.”
o In 2015 we will see continued discussion and lack of clarity around what constitutes “personal information” and to what extent that information may be accessed and shared by state or private actors.
o We will see a continued evolution in scope and content of data privacy rules and regulations; we may even see laws begin to regulate the use of previously anonymous data sets.
o The European Union, countries in Latin America, as well as Australia, Japan, South Korea, Canada, and many others may enact more stringent data privacy laws and regulations.
4. Ransomware evolves into the cloud. Ransomware will evolve its methods of propagation, encryption, and the targets it seeks. More mobile devices are likely to suffer attacks.
o We predict ransomware variants that manage to evade security software installed on a system will specifically target endpoints that subscribe to cloud-based storage solutions.
o Once the endpoint has been infected, the ransomware will attempt to exploit the logged-on user’s stored credentials to also infect backed-up cloud storage data.
o We expect the technique of ransomware targeting cloud-backed-up data to be repeated in the mobile space.
o We expect a continued rise in mobile ransomware using virtual currency as the ransom payment method.
5. New mobile attack surfaces and capabilities. Mobile attacks will continue to grow rapidly as new mobile technologies expand the attack surface.
o The growing availability of malware-generation kits and malware source code for mobile devices will lower the barrier to entry for cybercriminals targeting these devices.
o Untrusted app stores will continue to be a major source of mobile malware. Traffic to these stores will be driven by “malvertising,” which has grown quickly on mobile platforms.
6. PoS attacks increase and evolve with digital payments. Point of sale (PoS) attacks will remain lucrative, and a significant upturn in consumer adoption of digital payment systems on mobile devices will provide new attack surfaces that cybercriminals will exploit.
o Despite current efforts by retailers to deploy more chip-and-pin cards and card readers, McAfee Labs sees continued growth in PoS system breaches in 2015 based on the sheer numbers of PoS devices that will need to be upgraded in North America.
o Near field communications (NFC) digital payment technology will become an entirely new attack surface to exploit unless user education can successfully guide users in taking control of NFC features on their mobile devices.
7. Shellshock sparks Unix, Linux attacks. Non-Windows malware attacks will increase as a result of the Shellshock vulnerability.
o McAfee Labs predicts that the aftershocks of Shellshock with be felt for many years given the number of potentially vulnerable Unix or Linux devices, from routers to TVs, industrial controllers, flight systems, and critical infrastructure.
o In 2015, this will drive a significant increase in non-Windows malware as attackers look to exploit the vulnerability.
8. Growing exploitation of software flaws. The exploitation of vulnerabilities is likely to increase as new flaws are discovered in popular software products.
o McAfee Labs predicts that exploitation techniques such as stack pivoting, return- and jump-oriented programming, and a deeper understanding of 64-bit software will continue to drive the growth in the number of newly discovered vulnerabilities, as will the volume of malware that exploits those newly discovered vulnerabilities.
9. New evasion tactics for sandboxing. Escaping the sandbox will become a significant IT security battlefield.
o Vulnerabilities have been identified in the sandboxing technologies implemented with critical and popular applications. McAfee Labs predicts a growth in the number of techniques to exploit those vulnerabilities and escape application sandboxes.
o Beyond application sandboxing, McAfee Labs predicts that 2015 will bring malware that can successfully exploit hypervisor vulnerabilities to break out of some security vendors’ standalone sandbox systems.
For a full copy of the McAfee Labs Threats Report: November 2014, which includes 2015 threat predictions, please visit: .
About McAfee Labs
McAfee Labs is one of the world’s leading sources for threat research, threat intelligence, and cybersecurity thought leadership. The McAfee Labs team of more than 400 researchers collects threat data from millions of sensors across key threat vectors—file, web, message, and network. It then performs cross-vector threat correlation analysis and delivers real-time threat intelligence to tightly integrated McAfee endpoint and network security products through its cloud-based McAfee Global Threat Intelligence service. McAfee Labs also develops core threat detection technologies—such as DeepSAFE, application profiling, and graylist management—that are incorporated into the broadest security product portfolio in the industry.
About Intel Security
McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique McAfee Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. The mission of Intel Security is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com.
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.