Crystal ball gazing

2013-12-02

Helen Martin

Virus Bulletin, UK
Editor: Helen Martin

Abstract

Round-up of some of the security industry's predictions for the year ahead.


It has become an annual tradition as the year draws to a close for security firms to look ahead and reveal what they expect the new year to bring. On looking over a small selection of firms’ predictions, there is surprisingly little overlap – which, rather than suggesting a lack of cohesion, more likely reflects the complex and quickly evolving nature of today’s threat landscape. Some of the more common themes are summarized below.

While analyst firm Ovum predicts that attack volumes will continue to rise in 2014, with advanced persistent threat activity ‘moving up through the gears’, Websense actually foresees a drop in the volume of new malware – expecting cybercriminals to rely increasingly on lower volume, more targeted attacks that run a lower risk of detection.

Symantec predicts that no social network, no matter how niche or obscure, will be immune to the attentions of scammers, data-harvesters and cybercriminals – and Websense concurs, warning that attackers will increasingly focus on the more career-oriented networks (such as LinkedIn) in an attempt to target professionals and company executives. FireEye expects watering hole attacks and social media targeting increasingly to supplant spear-phishing emails.

Symantec predicts that the Internet of Things will become a magnet for hackers in 2014 – with proof-of-concept attacks against baby monitors, security cameras, smart TVs and medical equipment already having been demonstrated. Fortinet also anticipates seeing attacks against the Internet of Things – expecting Android developers to turn their attention to home automation equipment, wearable devices and portable games consoles, in doing so opening up a wealth of new opportunities for cybercriminals.

Fortinet predicts that, while encryption itself won’t change, the use of encryption will increase – foreseeing an overall rise in use of encryption prompted by fears of eavesdropping, whether by malware or government programs. Symantec also expects users to take active steps to keep their data private – with privacy protection starting to become a feature of new products, and the use of anonymity service Tor becoming increasingly widespread.

Websense predicts that Java will continue to be highly exploited as most end points continue to run old, vulnerable versions of Java. FireEye, on the other hand, expects Java zero-day exploits to become less prevalent, having observed a slowdown in the release of Java zero-day exploits since February this year. FireEye’s researchers believe that too few people are using vulnerable versions of Java to give exploit developers sufficient incentive to find bugs.

Fortinet predicts that more botnets will migrate from traditional C&C servers to P2P networks, making the botnets more robust against takedown attempts. FireEye also envisages changes in communication techniques – expecting malware authors to tunnel communications over legitimate protocols and abuse legitimate Internet services to relay traffic and evade detection.

Trusteer predicts that source code leaks will accelerate malware release cycles, providing cybercriminals with the building blocks to quickly create new variants. Meanwhile, Websense expects to see a struggle for power among exploit kits as the kits that have until now been the underdogs to market leader Blackhole rise to the fore following the arrest of the Blackhole creator.

Finally, FireEye predicts that attackers will find more ways to defeat automated analysis systems, and Trusteer expects to see a rise in malware using techniques to avoid analysis by malware researchers – expecting researcher evasion to become a standard component of most malware offerings.

One thing all vendors agree on is that the security landscape is certain to become more challenging over the coming year. More predictions can be found on each of the vendor’s sites.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.