Connect with us

Hi, what are you looking for?

HEADLINES

Cyber criminals continue to use new tactics in carrying out attacks – Symantec

Cyber criminals continue to use new tactics in carrying out attacks. This is according to the 2017 Symantec’s Internet Security Threat Report (ISTR), which provides a view of the threat landscape, including insights into global threat activity, cyber criminal trends and motivations for attackers.

“New sophistication and innovation are the nature of the threat landscape, but this year Symantec has identified seismic shifts in motivation and focus,” said Peter Sparkes, senior director, Cyber Security Services, Asia-Pacific and Japan at Symantec.

Cyber criminals continue to use new tactics in carrying out attacks. This is according to the 2017 Symantec’s Internet Security Threat Report (ISTR), which provides a view of the threat landscape, including insights into global threat activity, cyber criminal trends and motivations for attackers.

“New sophistication and innovation are the nature of the threat landscape, but this year Symantec has identified seismic shifts in motivation and focus,” said Peter Sparkes, senior director, Cyber Security Services, Asia-Pacific and Japan at Symantec.

Various cyber crimes were already widely covered by the media, including multi-million dollar virtual bank heists, attempts to disrupt the US electoral process by State-sponsored groups and the Distributed Denial of Service (DDoS) attacks using a botnet of Internet of Things (IoT). All these, according to the report, show “how skilled cyber criminals are in executing these crimes”.

“New sophistication and innovation are the nature of the threat landscape, but this year Symantec has identified seismic shifts in motivation and focus,” said Peter Sparkes, senior director, Cyber Security Services, Asia-Pacific and Japan at Symantec.

According to Sparkes, there is a new trend in cyber espionage that is causing an alarming increase in targeted attacks aimed at political manipulation and sabotage, with cyber criminals exploiting simple IT tools and cloud services. Cyber attacks against the US Democratic Party and the subsequent leak of stolen information are examples of these tactics that are being used to disrupt and influence election processes, and destabilized targeted organizations and countries.

Financial theft carried out virtually on the financial sector with billions of dollars stolen by cyber criminals is also becoming a major issue. Aside from the work of criminals, Sparkes said that for the first time, Symantec also observed indications of the involvement of nation states in this cyber crime.

Advertisement. Scroll to continue reading.

Another target for disruption is the IoT, which is attacked using the Mirai botnet within two minutes of connecting to the Internet, showing that devices connected to the Internet can easily be attacked.

The use of e-mail, meanwhile, has similarly become the weapon of choice for cyber criminals. Symantec found one in 131 emails contained a malicious link or attachment, the highest rate in five years.

Cyber criminals also use PowerShell, a scripting language installed in PCs, and Microsoft Office files as weapons. They used this as it leaves a lighter footprint and offers the ability to hide in plain sight.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

HEADLINES

The new solution equips security teams with significant innovations powered by AI and automation that go beyond traditional “peace time” approaches to cloud security...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

HEADLINES

Despite 65% having adopted generative artificial intelligence (GenAI capabilities), 89% of IT leaders are concerned that flaws in GenAI cybersecurity tools could put their...

Advertisement