Top 11 security threats for 2008

McAfee
McAfee Incorporation has released its top ten predictions for security threats in 2008. Researchers at McAfee Avert Labs expect an increase in Web dangers and threats targeting Microsoft Corporation Windows Vista operating system, among other new or increased threats. At the same time ad-serving software known as adware is expected to continue to decrease.

“Threats are increasingly moving to the Web and migrating to newer technologies such as VoIP and instant messaging,” said Jeff Green, senior vice president of McAfee Avert Labs and product development. “Professional and organised criminals continue to drive a lot of the malicious activity. As they become increasingly sophisticated, it is more important than ever to be aware and secure when traversing the Web.”

Web 2.0
With a handful of high-profile prosecutions of bot herders in 2007, criminals will be seeking better ways to cover their tracks. The Storm Worm set a worrying precedent. Also known as Nuwar, the Storm Worm has been the most versatile malware on record.

The creators released thousands of variants and changed coding techniques, infection methods and social engineering schemes far more than any other threat in history.

Storm created the largest peer-to-peer botnet ever. McAfee expects others will ride the coattails of that questionable success, pushing up the number of PCs turned into bots. Bots are computer programmes that give cyber crooks full control over PCs. Bot programmes typically get installed surreptitiously on the PCs of unknowing computer users.

Instant malware
The scenario of a “flash” worm via instant messaging applications has been foreshadowed for years. This threat could reach millions of users around the globe in a matter of seconds. There has been malware that spreads via IM, but we have yet to see such a self-executing threat. However, this may be closer than ever as the number of vulnerabilities in popular instant messaging applications more than doubled in 2007 compared to 2006.

More importantly, there were 10 high-severity risks in 2007, compared to none in 2006. Additionally, the top IM virus families of 2005 and 2006 were replaced with new active threats, signifying an out with the old and in with the new milestone. Skype saw its first batch of worms in 2007. Many more are expected to follow.

Online gaming
The threat to virtual economies is outpacing the growth of the threat to the real economy. As virtual objects continue to gain real value, more attackers will look to capitalise on this.

The evidence is already there. The number of password-stealing Trojans that targeted online games in 2007 grew faster than the number of Trojans that target banks.

Vista
In 2008, Windows Vista is set to gain additional market share and cross the 10 per cent barrier. The release of Service Pack 1 for Vista is also likely to accelerate the adoption of the Microsoft operating system. As Vista becomes more prevalent, attackers and malware authors will start in earnest to explore ways to circumvent the operating system’s defenses. There were 19 Vista vulnerabilities reported since its release earlier this year. We can expect a lot more Vista vulnerabilities to be reported in 2008.

Adware
The government crackdown against purveyors of ad-serving software has had a positive effect. The combination of lawsuits, better defenses, and the negative connotation associated with this form of advertising helped start the decline of adware in 2006.

This trend was confirmed in 2007 and with the major players out of the game, adware is expected to continue its decline in 2008.


Phishers
Cybercrooks will increasingly target smaller, less-popular sites with data-thieving phishing scams. It has become tougher and riskier to target top-tier sites as the big-name brands are responding more quickly and providing increased security.
Knowing that a large percentage of people reuse their usernames and passwords, less popular sites are likely to be targeted more frequently than before, giving criminals the same access.

Parasitic crimeware
Parasitic infectors are viruses that modify existing files on a disk, injecting code into the file where it resides. While crimeware was storming ahead in recent years, parasitic malware faded to the background. In 2007 several crimeware authors turned old school to deliver threats like Grum, Virut, and Almanahe; parasitic viruses with a monetary mission.

The number of variants of an older parasitic threat, Philis, grew by more than 400 per cent, while over 400 variants of a newcomer, Fujacks, were catalogued. We expect a continued interest in parasitics from the crimeware community, with overall parasitic malware expected to grow by 20 per cent in 2008.

Virtualisation
Security vendors will embrace virtualisation to create new, more resilient defenses. Today’s complex threats will be easily defeated, but researchers, professional hackers, and malware authors will begin looking at ways to circumvent the new defensive technology, continuing the classic game of cat and mouse.

VoIP
Already this year, more than double the number of security vulnerabilities have been reported in Voice over IP (Internet Protocol) applications, compared to all of 2006. We have also seen several high-profile “Vishing” attacks and a “phreaking” conviction.

It is clear that VoIP threats have arrived and there’s no sign of a slow down. The technology is still new and defence strategies are lagging. McAfee expects a 50 per cent increase in VoIP-related threats in 2008.

Botnets
With a handful of high-profile prosecutions of bot herders in 2007, criminals will be seeking better ways to cover their tracks. The Storm Worm set a worrying precedent. Also known as Nuwar, the Storm Worm has been the most versatile malware on record.

The creators released thousands of variants and changed coding techniques, infection methods and social engineering schemes far more than any other threat in history.

Storm created the largest peer-to-peer botnet ever. McAfee expects others will ride the coattails of that questionable success, pushing up the number of PCs turned into bots. Bots are computer programmes that give cyber crooks full control over PCs. Bot programmes typically get installed surreptitiously on the PCs of unknowing computer users.

More article at www.elitha-eri.net

Leave a Reply

Your email address will not be published. Required fields are marked *

three × three =

Get Adobe Flash player