Loading...

05 Dec 2025 23:24

Mobile & Digital

Targeted Attacks and Malware Set to be Biggest Cyber Threats of 2015

2014 was a big year for the cyber security industry with shocking revelations emerging of data breaches of immense scale conducted against some of the largest and most prestigious global organizations. At the start of the year, ESET, the global leader in proactive digital protection, correctly laid emphasis on internet privacy, new assaults on the Android operating system and the new wave of high-tech malware in its predictions for the main threats that business and home users would face. Based on extensive research conducted through 2014 and the analysis of global and regional cyber trends, the company has now put together its predictions for the top IT security trends that will dominate headlines in 2015.

Targeted attacks

If there is one lesson IT security researchers have learned in recent years, it is that targeted attacks are an increasing trend. And 2015 won’t be an exception. Most commonly known as Advanced Persistent Threats (APTs), their main differences with traditional cyber-attacks are target selection, duration of attack and stealth. In most of these attacks, there is a specific target, as opposed to traditional attacks that use any available corporate targets for their purposes. Secondly, these kinds of attacks try to stay unnoticed for longer periods of time. In this context, it is important to notice that the attack vectors are predominantly Social Engineering Attacks or zero-day exploits.

According to APTnotes repository- a site that collects APT attacks from various publicly-available documents and notes, sorted by year- these kinds of attacks have grown over the past several years from 3 identified attacks in 2008 to 75 known attacks in 2014 and probably many others as yet undiscovered. These stats are based only on well-known public attacks, so it is reasonable to think that the statistics showing a growing trend is real; the amount, however, should be bigger, taking into account attacks that never reach the public space because of confidentiality reasons.

Ransomware and malware

Ransomware will be a key point for malware developers and it will be a more relevant threat in the following years. During 2014, we saw big companies like Yahoo, Match or AOL get hit by ransomware and ESET researchers also published Android/Simplocker analysis, the first Android File-Encrypting TOR-enabled Ransomware. In December of 2014, in a panel discussion at Georgetown Law’s called “Cybercrime 2020: The Future of Online Crime and Investigations” it was mentioned that “ransomware is the future of consumer cybercrime”.

Payment systems in the spotlight

In parallel with the growing use of online payment systems, the cybercrime interest on attacking them grows too. At this point, it is already obvious that cybercriminals will continue putting efforts into payment systems the more money circulates on the web. On the other hand, point of sale systems are still a current technology and malware authors are well aware of that. In mid-2014 ESET published a blog post on We Live Security about the worm Win32/BrutPOS that tries to brute-force its way into PoS machines by trying a variety of (overused) passwords in order to log in via Remote Desktop Protocol (RDP).

There are other malware families for POS like JacksPos or Dexter, which could be the responsible ones for big attacks on Target wherein 40 million cards’ data was stolen or Home Depot where 56 million cards were leaked after more than 5 months of the attack that started in April and was not discovered until almost September, when the company announces the leak.

It is interesting to note that since the BlackPOS source code was leaked in 2012, it will probably facilitate the creation of new variants of this threat that will increase over the next few years.

Internet of Things: Attacks on Things

There is no reason to think that new devices that are going to be connected to the Internet, storing more data on them and being useful for users, are not going to be a target for cybercrime. The Internet of Things trend will surely create an interest for cyber criminals. During this year we have seen some evidence of this emerging trend, like attacks on cars shown at Defcon conference using ECU devices or the Tesla car that was hacked to open doors while in motion, as discovered by Nitesh Dhanjani. Attacks and proofs of concept were shown on several SMART TVs, Boxee TV devices, biometric systems on smartphones, routers and also on Google glasses!

It should be noted though that the internet of things is an emerging space for cyber crime so it will take a few more years until it is in common use. Nevertheless, this will be a trend not for its quantity but for its uniqueness and innovation.

These are only the most important things that ESET has identified as big trends for 2015 regarding malware and cyber-attacks. Of course there are other current trends like mobile attacks that will remain on the rise and much more information to be shared. Knowing what to expect can help organizations and users be more aware and thus better protected.

NULL
(Visited 6 times, 1 visits today)
peri hokiperihokiduta76dsiledAt-Taujih; Jurnal Bimbingan Konseling Islamabc1131 slot viralScatter Hitamslot gacor qrisslot thailandabc1131duta 76slot qris danaabc1131 slot777 lundbergdesign.comABC1131mpo slotslot gacorMPO SLOTcleaning service bug volatility starlight baccarat abc1131 emosiburuh pelabuhan rumus free spin gates roulette abc1131 tamaktaktik main mahjong wild 2 sicbo di duta76 peluang gampang menang terbuka dengan lebarstrategi langsung jackpot scatter di mahjong ways 2 pgsoft baccarat duta76 emang gilaalgoritma paling viral panduan mudah bermain mahjong wins 3 blackjack dari duta76petualangan game paling gila di mahjong wild deluxe sicbo auto cuan besar perihokikekuatan wild mahjong ways 2 pgsoft baccarat jam gacor perihoki rtp live gampang maxwinpengalaman paling profit dari mahjong wins 3 blackjack dari perihoki tanpa pakai auto spins algoritma misterius mw2s analisis ritme reel tekniks formula menang mahjong ways 2 modals guide terbaru mw 2s menafsir gerak reels mahjong wayss menggubah kejutan mega win mahjong wayss panduan rahasia pola mahjong ways 2 modals pengurai pola scatter cara menentukans pulse reader mahjong ways 2 hitungs rahasia pola gacor mahjong ways 2 dibocorkans rumus panas teknologi ais saat alur mahjong ways berpadu dengan zenbaca rtp mahjong pemulaspam spin pak jono mahjongstrategi toni mahjong profitlangkah cerdas panji scattertaktik spam spin soniteknik baca rtp aguskejar kesempatan strategi memancing wild emas pengganda tinggi di mahjong wins3menangkan tanpa rungkad panduan anti rungkad menguasai pola tarikan liar game dan analisis cepat rtp game pgsoftobsesi animasi mahjong ways yang ubah hidup menjadi developer andalrahasia ritme stabil pattern manja baccarat casino yang mengubah cara bermainraih kemenangan maksimal dengan strategi auto gacor rahasia setting pola mudah yang terbukti ampuhdata analyst bongkar rahasia probabilitas cerdas di mahjong ways 2 strategi unggul di 2025data rtp pragmatic play rahasia zona stabil yang mengungkap kemenanganledakan inovasi pragmatic play saksikan tren utama yang menggemparkan industrirevolusi strategi mahjong pgsoft berhasil atasi deadspin pada mode regulerterungkap rahasia cara membaca pola wild dan multiplier lucky neko untuk permainan lebih terarahgelombang tipis mahjong wins 3 hancurkan simbol tengah tanpa animasi fakta mengejutkan terpantaurahasia spin digital teknik memancing fitur bonus dengan ritme spin tertenturahasia terungkap strategi sistematis menentukan momentum sweet bonzna candyland untuk mengelola risikoraih kemenangan dengan sic bo live temukan skill pengaman terbaik untuk strategi andalan andarumus rahasia main mahjong wild 2 sicbo yang dibagikan gratis oleh admin duta76duta76 fomo algoritma mahjong wins 3 scatter hitam bisa dapatkan kemenangan besar baccaratjalan menuju sukses di mahjong ways 2 pgsoft sicbo dengan gampang di perihokiperihoki bongkar rahasia mahjong wins 3 auto profit besar rtp live tertinggimontir bengkel kompresi data mahjong pgsoft abc1131 baccaratpenjual pasar malam cluster sweet bonanza abc1131 bluffing pokertukang cukur cold chip mahjong wins 3 abc1131 bahasa tubuhevaluasi strategi mahjong awsbetide inspirasi mahjong wins3ledakan profit tanpa henti terjadi saat scatter hitam mengendalikan jalannya putaran mahjong wins 3putaran mahjong wins 3 tidak pernah sama ketika scatter hitam menyulut efek keberuntungan berantaimomentum scatter wild di mahjong ways 2 menjadi titik balik menuju ledakan keuntungan besarkombinasi scatter wild mahjong ways 2 membuka jalan cepat menuju perkalian tinggi yang menguntungkanmomentum perkalian gilagilaan terjadi ketika scatter hitam muncul sebagai simbol paling menakutkanlayar mahjong wins 3 langsung bergemuruh saat scatter hitam menyalakan perkalian besar secara beruntunperan scatter wild di mahjong ways 2 hadir sebagai kunci strategis untuk meledakkan potensi profitscatter wild mahjong ways 2 menjadi pemicu awal terbukanya jalur cuan besar dalam waktu singkatketika scatter hitam turun setiap detik putaran mahjong wins 3 menjadi ajang ledakan profit tanpa batasmomen putaran mahjong wins 3 berubah dahsyat saat scatter hitam memicu gelombang cuan tanpa hentirevolusi gameplay pgsoft pangkas deadspin di mode regular mahjong Top