Loading...

19 Feb 2026 02:57

Mobile & Digital

Targeted Attacks and Malware Set to be Biggest Cyber Threats of 2015

2014 was a big year for the cyber security industry with shocking revelations emerging of data breaches of immense scale conducted against some of the largest and most prestigious global organizations. At the start of the year, ESET, the global leader in proactive digital protection, correctly laid emphasis on internet privacy, new assaults on the Android operating system and the new wave of high-tech malware in its predictions for the main threats that business and home users would face. Based on extensive research conducted through 2014 and the analysis of global and regional cyber trends, the company has now put together its predictions for the top IT security trends that will dominate headlines in 2015.

Targeted attacks

If there is one lesson IT security researchers have learned in recent years, it is that targeted attacks are an increasing trend. And 2015 won’t be an exception. Most commonly known as Advanced Persistent Threats (APTs), their main differences with traditional cyber-attacks are target selection, duration of attack and stealth. In most of these attacks, there is a specific target, as opposed to traditional attacks that use any available corporate targets for their purposes. Secondly, these kinds of attacks try to stay unnoticed for longer periods of time. In this context, it is important to notice that the attack vectors are predominantly Social Engineering Attacks or zero-day exploits.

According to APTnotes repository- a site that collects APT attacks from various publicly-available documents and notes, sorted by year- these kinds of attacks have grown over the past several years from 3 identified attacks in 2008 to 75 known attacks in 2014 and probably many others as yet undiscovered. These stats are based only on well-known public attacks, so it is reasonable to think that the statistics showing a growing trend is real; the amount, however, should be bigger, taking into account attacks that never reach the public space because of confidentiality reasons.

Ransomware and malware

Ransomware will be a key point for malware developers and it will be a more relevant threat in the following years. During 2014, we saw big companies like Yahoo, Match or AOL get hit by ransomware and ESET researchers also published Android/Simplocker analysis, the first Android File-Encrypting TOR-enabled Ransomware. In December of 2014, in a panel discussion at Georgetown Law’s called “Cybercrime 2020: The Future of Online Crime and Investigations” it was mentioned that “ransomware is the future of consumer cybercrime”.

Payment systems in the spotlight

In parallel with the growing use of online payment systems, the cybercrime interest on attacking them grows too. At this point, it is already obvious that cybercriminals will continue putting efforts into payment systems the more money circulates on the web. On the other hand, point of sale systems are still a current technology and malware authors are well aware of that. In mid-2014 ESET published a blog post on We Live Security about the worm Win32/BrutPOS that tries to brute-force its way into PoS machines by trying a variety of (overused) passwords in order to log in via Remote Desktop Protocol (RDP).

There are other malware families for POS like JacksPos or Dexter, which could be the responsible ones for big attacks on Target wherein 40 million cards’ data was stolen or Home Depot where 56 million cards were leaked after more than 5 months of the attack that started in April and was not discovered until almost September, when the company announces the leak.

It is interesting to note that since the BlackPOS source code was leaked in 2012, it will probably facilitate the creation of new variants of this threat that will increase over the next few years.

Internet of Things: Attacks on Things

There is no reason to think that new devices that are going to be connected to the Internet, storing more data on them and being useful for users, are not going to be a target for cybercrime. The Internet of Things trend will surely create an interest for cyber criminals. During this year we have seen some evidence of this emerging trend, like attacks on cars shown at Defcon conference using ECU devices or the Tesla car that was hacked to open doors while in motion, as discovered by Nitesh Dhanjani. Attacks and proofs of concept were shown on several SMART TVs, Boxee TV devices, biometric systems on smartphones, routers and also on Google glasses!

It should be noted though that the internet of things is an emerging space for cyber crime so it will take a few more years until it is in common use. Nevertheless, this will be a trend not for its quantity but for its uniqueness and innovation.

These are only the most important things that ESET has identified as big trends for 2015 regarding malware and cyber-attacks. Of course there are other current trends like mobile attacks that will remain on the rise and much more information to be shared. Knowing what to expect can help organizations and users be more aware and thus better protected.

NULL
(Visited 9 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandabout usAWSBETpanduan eksklusif menerobos mekanisme mahjong wild deluxe gates of olympus sicbo teknik kalkulasi pembacaan rtp live duta76duta76 mengurai logika simbol mahjong ways 2 pgsoft pola kartu baccarat dan starlight princess melalui teknik observasi berbasis rtp livemembongkar celah peluang jitu mahjong wins 3 pragmatic blackjack sweet bonanza melalui teknik observasi strategi penempatan adaptif duta76mengurai mekanisme simbol mahjong ways 2 pgsoft putaran roulette scatter wild west gold melalui taktik kalkulasi entropi berbasis peluang terukur duta76teknik membaca peluang mahjong wins 3 pragmatic sabung ayam sv388 blackjack lewat analisa ritme siklus strategi kalkulasi presisi adaptif duta76membongkar logika simbol mahjong wild deluxe pola dadu sicbo cascade gates of olympus strategi observasi frekuensi berbasis data perihokianalisa perihoki volatilitas mahjong ways 2 pgsoft baccarat starlight princess taktik pola rtp live dan teknik prediksi peluang lintas permainanpemetaan anomali rtp live sweet bonanza blackjack mahjong wins 3 pragmatic strategi pembacaan pola silang taktik manajemen berbasis frekuensi perihokidekonstruksi siklus bonus wild bounty hunter putaran roulette frekuensi mahjong ways 2 pgsoft melalui taktik analitis eksklusif berbasis rtp live terukur perihokitaktik mendeteksi ritme sabung ayam sv388 mahjong wins 3 pragmatic blackjack pendekatan kalkulasi pola presisi terjamin perihokiteknik pembacaan pola multiplier cascade distribusi tile dalam gates of olympus mahjong wild deluxe sicbo dengan kalkulasi terukur perihokipanduan holistik menembus mekanisme distribusi kartu baccarat simbol mahjong ways 2 pgsoft multiplier starlight princess melalui taktik analisa rtp live perihokimenavigasi pola cluster sweet bonanza siklus kartu blackjack tile mahjong wins 3 pragmatic analisa momentum rtp live adaptif taktik lintas perihokitaktik mendeteksi ritme kemenangan wild west gold mahjong ways 2 pgsoft roulette pendekatan probabilitas kalkulasi momentum presisi eksklusif duta76mengurai mekanisme distribusi simbol mahjong wins 3 pragmatic kartu blackjack sabung ayam sv388 melalui taktik kalkulasi berbasis peluang terukur duta76aws grid rtp mahjongaws logika matematika mahjongaws logika strategi mahjongaws pengelolaan modal mahjongaws perubahan alur mahjongaws sinkronisasi simbol mahjongaws strategi rahasia mahjongaws tempo respon mahjongaws variasi pola mahjongaws wild momentum mahjongaws adaptasi transisi mahjongaws analisis keputusan mahjongaws analisis retrigger mahjongaws deteksi suasana mahjongaws pembaruan sistem mahjongaws perubahan tempo mahjongaws target awal mahjongaws tips statistik mahjongaws transisi fase mahjongaws wild emas mahjonge4 formula stabil dengan evaluasi rtp berkalae4 manajemen saldo profesional dalam mahjong wins 3e4 mental tangguh ala atlet olimpiade untuk scatter hitam mahjong wins 2e4 metode main disiplin dengan rtp stabil paling dicarie4 mindset juara dan pola main konsisten mahjong wins 2e4 optimasi hasil dengan strategi data drivene4 pendekatan modern mahjong wins berbasis statistike4 pendekatan terstruktur mengikuti irama sistemdekonstruksi mekanik scatter hitam mahjong ways akumulasi tinggimanajemen finansial terpadu dinamika putaran mahjong winsevolusi algoritma mahjong ways 2 arena ketangkasan digital 2026analisis sinkronisasi energi multiplier starlight princess fase akumulasirekonstruksi mekanik multiplier sugar rush 1000 konsistensi hasilintegrasi narasi budaya multiplier gates of gatot kaca strategi digitalmetodologi pemetaan roda keempat aztec gems peluang transisidekonstruksi mekanik tumble multiplier sweet bonanza akumulasi terstrukturanalisis volatilitas sticky wild wild west gold stabilitas sesiharmonisasi ekspansi simbol koi gate ketahanan saldo ritme bermainefektivitas multiplier berjenjang lucky neko pertumbuhan hasilkajian teknik hold and spin great rhino megaways capaian finansialanalisis struktur peluang buffalo king algoritma komputasimekanisme sticky wild multiplier the dog house stabilitas hasilimplementasi strategi hammer multiplier power of thor ritme akumulasistrategi dekonstruksi pola mahjong wild 2 dadu sicbo gates of olympus lewat analisa siklus rtp live dan teknik pembacaan momentum duta76pola starlight princess siklus kartu baccarat mahjong ways 2 pgsoft pendekatan analisa momentum rtp live adaptif taktik cerdas duta76taktik mendeteksi ritme kemenangan sweet bonanza mahjong wins 3 pragmatic blackjack pendekatan kalkulasi momentum eksklusif duta76metode penetrasi algoritma mahjong ways 2 pgsoft roulette wild bounty showdown melalui interpretasi rtp live dan arsitektur peluang duta76peluang sabung ayam sv388 mahjong wins 3 pragmatic blackjack lewat pembacaan pola dan manipulasi threshold volatilitas rtp live berbasis data duta76mengurai mekanisme distribusi simbol mahjong wild 2 kombinasi dadu sicbo dan cascade gates of olympus melalui taktik kalkulasi peluang terukur perihokiteknik eksklusif membaca peluang mahjong ways 2 pgsoft starlight princess baccarat analisa ritme siklus strategi kalkulasi presisi perihokimembongkar celah peluang mahjong wins 3 pragmatic blackjack sweet bonanza melalui teknik observasidan strategi penempatan adaptif perihoki cerdasdeteksi irama wild west gold mahjong ways 2 pgsoft roulette dengan kalibrasi bias probabilitas dan komputasi jejak momentum perihoki eksklusifstrategi mahjong wins 3 pragmatic blackjack sabung ayam sv388 via dekripsi irama subliminal dan instrumentasi rtp live jitu perihokipanduan eksklusif menerobos volatilitas tersembunyi dadu sicbo mahjong wild 2 gates of olympus dengan teknik cross pattern manajemen siklus adaptif cerdas perihokipemetaan anomali rtp live starlight princess baccarat mahjong ways 2 pgsoft strategi pembacaan pola taktik manajemen berbasis data akurat presisi perihokimengeksploitasi frekuensi tumble sweet bonanza entropi blackjack mahjong wins 3 pragmatic lewat strategi cross analisa rtp live jitu perihokiteknik penetrasi peluang mahjong ways 2 pgsoft wild bounty showdown roulette via modulasi siklus laten dan konstruksi volatilitas duta76 cerdaslogika tersembunyi blackjack sabung ayam sv388 mahjong wins 3 pragmatic dengan disrupsi arsitektur pola rtp live dan interpolasi peluang duta76 Top