Truemag

  • Subscribe
    • New Subscription
    • Account Updates
    • Customer Service
  • News & Events
    • News
    • Events
  • Advertise
    • Media Kit
    • Reprints
    • Contacts
  • Editorial
    • Podcasts
    • Current Articles
    • Digital Editions
    • eNewsletter
    • Editor’s Desk
    • Edit Calendar
    • Contacts
  • Buyers Guide
    • Search
    • Sponsor Index
    • Vendor Update
  • Annual Software Ranking
    • Ranking Form
    • Annual Software Ranking
    • 2018 Software Ranking File Package

Ransomware Tops the List of Cyberattacks in Q2

7.28.16

In the latest quarterly report from PandaLabs, Panda Security’s anti-malware laboratory, we review the 18 million new malware samples that were discovered this quarter, an average of 200,000 samples every day. Trojans maintain their position at the top of the list of captured malware, highlighting the rise of ransomware attacks in this category. Ransomware has become an international business that costs billions of dollars each year.

Ransomware and Information Theft

Money is always the main motivation for cybercrime. We have seen how this can be done in a variety of ways: through Ransomware, by stealing information from businesses and users, and sometimes by specifically targeting banks.
Team Skeet, a website that distributes pornographic videos and belongs to the Paper Street Media network, recently suffered an attack where data belonging to 237,000 users was stolen including physical addresses; this sensitive information is being sold on the black market for an excessive price ($400 per credential, a total value adding up to almost $95 million dollars).
In another incident of information theft, contact information for 1,100,000 users was stolen from the website beautifulpeople.com, leaving users’ information exposed. Acer also fell victim to an attack on their ecommerce site where data was stolen from 34,500 of their users. The most serious point about this case is that their site was compromised for nearly a year without their knowledge.
All of these attacks have something in common: a large payment to recover stolen information without a guarantee that everything will be returned.

A Rise in Attacks against PoS Terminals and Financial Entities

Another widespread and popular theft tactic is through Point of Sale (PoS) terminals, such as PunkeyPOS. Pandalabs discovered this malware that infected more than 200 restaurants in the United States and stole information from credit cards used in those establishments.
What is the most succulent theft that we have spoken of thus far? The only thing that gives a more lucrative result is to directly rob the banks, something that happened to the Central Bank of Bangladesh, where hackers were able to successfully transfer 81 million dollars. Subsequently, two similar cases occurred: one against a bank in Vietnam and another against a bank in Ecuador.

Security Breaches in Mobile Devices and the IoT

It seems like Google has gone full throttle when it comes to patching all security holes in its operating systems, with monthly updates that fix all newly discovered vulnerabilities. Even so, the improvements made by the technology giant cannot prevent Android from becoming a dangerous ecosystem as attacks increase exponentially.
At the same time, PandaLabs predicts that businesses will gradually increase spending onthe IoTs. The consultant Gartner publicized an interesting report on security in the Internet of Things. In this document, they predicted that 25% of the attacks suffered by businesses will involve IoT devices by 2020. It is expected that in 2016, 6.4 billion of these devices will be connected to the net (30% more than 2015) and in 2018 they calculate that the number of these devices will be over 11.4 billion.

The Advancing Cyberwar

When we are discussing cyberwar in the majority of these occasions, we are talking about attacks that are probably sponsored by different countries, even though it is rare to find evidence that confirms who is responsible for the attack. However, the United States went on the offensive and acknowledged that they are launching cyberattacks against ISIS.

We learned of another cybersecurity incident in the month of June, when South Korea’s police department publicized an attack from North Korea. It seems that the attack began over a year ago, focused on 140,000 computers belonging to organizations and government agencies, as well as defense contractors. This attack was not discovered until this February. According to police, more than 42,000 documents were stolen in which 95% of them were defense-related, for example the plans and specifications of the American F15 fighter plane’s wings.

www.pandasecurity.com

Jul 28, 2006Olivia Cahoon
VelocityEHS and Enhesa Announce Strategic Partnership to Streamline Regulatory ComplianceReltio Raises $22M to Build on Leadership in Modern Data Management
Product Centrics
TrueNAS Open Source Storage Platform brings Full Windows ACL Support to Linux

Fully featured Windows file system ACLs are well supported in TrueNAS 12.0 (CORE and Enterprise), but not generally supported by Linux. Thanks to some innovation, and sweat from the iXsystems engineering team, TrueNAS SCALE 21.08...

Driving Successful Digital Transformation Initiatives in 2022

Well, the end of the year is the perfect time to reflect on all the past year's activities and plan for the coming year. As we plan for 2022, one thing...

Recovery Platforms

Established in 2013, Imanis Data, previously Talena...

Data Driven Efficiency

Founded in 2003, Tableau is a public software company...

Updated Hitachi CRM

Building Product Manufacturers (BPM) require...

Quick Links
Untitled Document
SW500 SW500 SW500 SW500 SW500
2022 © Rockport Custom Publishing, LLC