\n
The mysterious attack on the Baku-Tblisi-Ceyhan pipeline, which was built with US encouragement and despite Russia<\/a>'s reservations, is seen as marking the beginning of a new era of cyber war.
\n
\nIt has been blamed on Russian cyber spies who were suspects also in the attack on JP Morgan Chase. The Russian groups have become so emboldened that they targeted several German government websites on Wednesday, including the official page of Chancellor Angela Merkel.
\n
The US security establishment itself now boasts of 6,000 cyber warriors — the crack troops who are suspected to be behind the crippling of North Korean internet<\/a> networks following the Sony attack — and is prepared for a digital Peral Harbour.
\n
\nGlobally, security analysts called 2013 the year of the mega breach, with a 62 per cent increase in the number of data breaches compared to 2012. The year also saw a 91 per cent increase in targeted attacks. Both sophistication and brazenness of cybercrime syndicates or, for that matter, 'hactivists'has increased.
\n
\n'Spearfishing', which involves intelligent emails targeted at individuals, catching targets off guard by making 'emotional connection' where criminals back up enticing emails with phone calls to win the victims' trust, focusing on \"watering holes\" which are frequented by targets and throwing baits like \"free\" broadband connections show the expanded arsenal of cyber criminals.
\n
Growing incidence of the use of 'Cryptolocker' virus and 'ransom ware' to force victims to buy decryption software or pay up to secure the release of his device and files signals the audacity of the gangs prowling cyber space, whose attacks on leading names in business like Target, Ebay<\/a>, JP Morgan Chase, Adobe and Home Depot led to huge plunder of credit card and debit card details of their customers. Companies also suffered hugely on account of erosion of trust.
\n
\nRecently, Symantec, a software security major, uncovered a new piece of malware — Regin — which bears the hallmarks of a state-sponsored operation and is believed to have been in use since at least 2008.
\n
It, just like 'Dragonfly', another malware which appears to be a state-sponsored effort, is persistent in seeking access to targets and stealing information and is far more complex than Stuxnet, which was used to target Iran<\/a>'s nuclear plants. Experts at Symantec believe many components of Regin remain undiscovered and it may have more versions and can perform more functions for cyber espionage and sabotage.
\n
\nMichael Counsel, chief technology officer and vice-president consulting, products & services, Asia Pacific and Japan, said Symantec's cyber threat intelligence had helped the firm identify some significant threats including Regin and other highly adept attack groups like the Dragonfly that was behind several sophisticated attacks on industrial control systems in the energy sector in the US and Europe.
\n
\nTalking about the need to successfully defend against targeted attacks, Counsel said businesses needed to expand their focus from prevention to detection and response. While the threat of attack on individual targets by immobilizing their cars and medical devices doesn't seem distant anymore, cyber criminals can inflict immense harm on companies by reaching them through their vendors, a soft underbelly according to Symantec, to steal data and intellectual property.
\n
\nThere is a gang, ATP Group, which specifically targets hotel guests, while also attacking 'smart meters' to disrupt power supply in cities.
\n
\n'Distributed denial of service' attacks - in which servers are flooded with traffic until they collapse -- have become a tougher challenge. Symantec, which was engaged by FBI and EuroPol Scotland Yard and other government agencies to take down 'Blackshades', a powerful and popular Trojan, Zeus Botnet and Major Cryptolocker, concedes cyber crime networks have become more resilient and taking down new Botnet attacks will be difficult.
\n
\n(The writer was hosted by Symantec at a conference on cyber security in Sydney recently)\n\n<\/body>","next_sibling":[{"msid":45847996,"title":"Facebook pips peers to continue reign as top social network","entity_type":"ARTICLE","link":"\/news\/facebook-pips-peers-to-continue-reign-as-top-social-network\/45847996","category_name":null,"category_name_seo":false}],"related_content":[],"msid":45850246,"entity_type":"ARTICLE","title":"Cyber attacks becoming more sophisticated, brazen","synopsis":"Mysterious attack on the Baku-Tblisi-Ceyhan pipeline, which was built with US encouragement, is seen as the beginning of a new era of cyber war.","titleseo":"cyber-attacks-becoming-more-sophisticated-brazen","status":"ACTIVE","authors":[{"author_name":"Diwakar","author_link":"\/author\/3108\/diwakar","author_image":"https:\/\/etimg.etb2bimg.com\/authorthumb\/3108.cms?width=100&height=100&hostid=268","author_additional":{"thumbsize":true,"msid":3108,"author_name":"Diwakar","author_seo_name":"Diwakar","designation":"Associate Editor","agency":false}}],"Alttitle":{"minfo":""},"artag":"TNN","artdate":"2015-01-12 12:11:31","lastupd":"2015-01-12 12:16:11","breadcrumbTags":["Internet","Sydney","Russia","united states","Iran","eBay"],"secinfo":{"seolocation":"cyber-attacks-becoming-more-sophisticated-brazen"}}" data-authors="[" diwakar"]" data-category-name="" data-category_id="" data-date="2015-01-12" data-index="article_1">
网络攻击变得更加复杂,厚颜无耻
神秘的攻击才能管道,这是建立在我们的鼓励下,被视为网络战争的一个新时代的开始。
悉尼:最近的网络攻击索尼影业来自于北朝鲜骇客的攻击再次把焦点放在危险跟踪世界前所未有的数字连接。目前主要局限于个人电脑和笔记本电脑、智能手机和平板电脑的威胁只会变大成为日常使用的设备。
神秘的攻击才能管道,这是建立在我们的鼓励下,尽管俄罗斯预订,被视为网络战争标志着一个新时代的开始。
它已经被归咎于俄罗斯间谍嫌疑人也在对摩根大通的攻击。俄罗斯组织已经变得如此大胆,他们有针对性的几个德国政府网站周三,包括德国总理安格拉•默克尔(Angela Merkel)的官方页面。
美国安全机构本身现在拥有6000网络战士——背后的精锐部队被怀疑是朝鲜的严重互联网网络后,索尼攻击,准备一个数字珍珠港。
全球安全分析师称为2013年的大破坏,数量增加了62%,比2012年的数据泄露。今年在有针对性的攻击也增长了91%。复杂性和厚颜无耻的网络犯罪集团,或者就此而言,hactivists有增加。
“捕鱼观光”,包括智能邮件针对个人,捕捉目标措手不及,使罪犯的情感联系,诱人的邮件与电话备份到受害者的信任,赢得关注“酒吧”,这是经常光顾的目标和扔鱼饵像“免费”宽带连接显示扩展网络罪犯的阿森纳。
发病率增长的使用“Cryptolocker”病毒和“赎金器皿”迫使受害者买解密软件或支付安全设备和文件的发布信号无畏的团伙在网络空间,攻击的主要名称等业务的目标,易趣摩根大通,Adobe和家得宝(Home Depot)导致的巨大掠夺信用卡和借记卡的细节,他们的客户。公司也遭受了巨大的侵蚀的信任。
赛门铁克最近,软件安全专业的学生,发现了一块新的恶意软件——雷金——熊政府操作的特点,被认为是在使用至少自2008年以来。
它,就像“蜻蜓”,另一个恶意软件似乎是一个国家的努力,持续在寻求获得目标和窃取信息和比Stuxnet复杂得多,这是用于目标伊朗核电站。赛门铁克的专家相信许多组件雷金仍未被发现的,它可能有更多的版本,可以执行更多的功能网络间谍和破坏。
首席技术官和副总裁Michael顾问咨询、产品和服务,亚太和日本,说赛门铁克的网络威胁情报帮助公司识别一些重要的威胁包括雷金和其他高度熟练的攻击像蜻蜓,后面几个复杂的攻击工业控制系统在能源部门在美国和欧洲。
谈论成功抵御攻击目标的需要,律师表示,企业需要扩大他们的注意力从预防、检测和响应。而攻击单个目标的威胁使不动他们的汽车和医疗器械似乎并不遥远了,网络罪犯能对公司造成巨大的伤害,达到他们通过他们的供应商,根据赛门铁克的一个软肋,窃取数据和知识产权。
有一个帮派,ATP集团专门针对酒店的客人,同时也攻击“智能电表”破坏城市的电力供应。
“分布式拒绝服务”攻击,服务器充斥着流量,直到他们崩溃——已经成为一个艰巨的挑战。赛门铁克,由联邦调查局和欧洲刑警组织参与苏格兰场和其他政府机构采取“Blackshades”,一个强大的和流行的木马,宙斯僵尸网络和主要Cryptolocker,承认网络犯罪网络变得更有弹性和取下新的僵尸网络攻击将是困难的。
(作者是由赛门铁克网络安全会议上最近在悉尼)
神秘的攻击才能管道,这是建立在我们的鼓励下,尽管俄罗斯预订,被视为网络战争标志着一个新时代的开始。
它已经被归咎于俄罗斯间谍嫌疑人也在对摩根大通的攻击。俄罗斯组织已经变得如此大胆,他们有针对性的几个德国政府网站周三,包括德国总理安格拉•默克尔(Angela Merkel)的官方页面。
美国安全机构本身现在拥有6000网络战士——背后的精锐部队被怀疑是朝鲜的严重互联网网络后,索尼攻击,准备一个数字珍珠港。
全球安全分析师称为2013年的大破坏,数量增加了62%,比2012年的数据泄露。今年在有针对性的攻击也增长了91%。复杂性和厚颜无耻的网络犯罪集团,或者就此而言,hactivists有增加。
“捕鱼观光”,包括智能邮件针对个人,捕捉目标措手不及,使罪犯的情感联系,诱人的邮件与电话备份到受害者的信任,赢得关注“酒吧”,这是经常光顾的目标和扔鱼饵像“免费”宽带连接显示扩展网络罪犯的阿森纳。
发病率增长的使用“Cryptolocker”病毒和“赎金器皿”迫使受害者买解密软件或支付安全设备和文件的发布信号无畏的团伙在网络空间,攻击的主要名称等业务的目标,易趣摩根大通,Adobe和家得宝(Home Depot)导致的巨大掠夺信用卡和借记卡的细节,他们的客户。公司也遭受了巨大的侵蚀的信任。
赛门铁克最近,软件安全专业的学生,发现了一块新的恶意软件——雷金——熊政府操作的特点,被认为是在使用至少自2008年以来。
它,就像“蜻蜓”,另一个恶意软件似乎是一个国家的努力,持续在寻求获得目标和窃取信息和比Stuxnet复杂得多,这是用于目标伊朗核电站。赛门铁克的专家相信许多组件雷金仍未被发现的,它可能有更多的版本,可以执行更多的功能网络间谍和破坏。
首席技术官和副总裁Michael顾问咨询、产品和服务,亚太和日本,说赛门铁克的网络威胁情报帮助公司识别一些重要的威胁包括雷金和其他高度熟练的攻击像蜻蜓,后面几个复杂的攻击工业控制系统在能源部门在美国和欧洲。
谈论成功抵御攻击目标的需要,律师表示,企业需要扩大他们的注意力从预防、检测和响应。而攻击单个目标的威胁使不动他们的汽车和医疗器械似乎并不遥远了,网络罪犯能对公司造成巨大的伤害,达到他们通过他们的供应商,根据赛门铁克的一个软肋,窃取数据和知识产权。
有一个帮派,ATP集团专门针对酒店的客人,同时也攻击“智能电表”破坏城市的电力供应。
“分布式拒绝服务”攻击,服务器充斥着流量,直到他们崩溃——已经成为一个艰巨的挑战。赛门铁克,由联邦调查局和欧洲刑警组织参与苏格兰场和其他政府机构采取“Blackshades”,一个强大的和流行的木马,宙斯僵尸网络和主要Cryptolocker,承认网络犯罪网络变得更有弹性和取下新的僵尸网络攻击将是困难的。
(作者是由赛门铁克网络安全会议上最近在悉尼)
评论
现在评论 阅读评论(1)所有评论
找到这个评论进攻?
下面选择你的理由并单击submit按钮。这将提醒我们的版主采取行动