PCIe Webinar Banner
WP_Term Object
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 293
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 293
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)
by Matthew Rosenquist on 12-14-2016 at 12:00 pm

Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop. The tougher challenge is figuring out where they will take aim tomorrow. Knowing where cyber threats will attack in the future, gives the necessary insights to be one step ahead of their mayhem.

In the Short Term
With the holiday approaching, the next focus will be the lucrative ecommerce online shopping, email ransomware, phishing for credentials, and infection by holiday-lurking malware. It is also a time for dark-markets to thrive, selling unmentionables to those looking for illegal items for the holiday celebrations.

We must all expect malware ridden holiday sale emails and websites. Look for the fake shipping invoice or an urgent message from some merchant. All bogus. Shady ecommerce sites, advertising insane deals as bait will look to harvest credit card accounts, emails, and maybe convince you to install some ‘helpful’ software. Phishing will increase a notch and look for a new wave of ransomware to hold family pictures, personal files, and entire systems for extortion. Identity theft will add to the rise of new credit card applications to do some unauthorized shopping. In the next couple of months, all these financially motivated threats will increase, so now is a time to be more on your guard.

Businesses Beware
Businesses must worry about the increased amount of ecommerce fraud, ransomware that extorts money to unlock important files, and the ever present risk of data breaches. Healthcare, retail, and financial sectors will be targeted the most, but all businesses are in jeopardy. Social media will be targeted as a springboard to reach more potential victims and influence them to download or visit sites containing malware. For some larger companies, who rely on heavy web traffic, there will be Distributed Denial of Service (DDoS) extortion attempts. Pay or be unavailable to your customers, will be the threat. As always, cash is king and credit is queen. More ATM attacks are in our future. Europe will be the hotbed, given its machine density and proximity to current thieving bands who are becoming more proficient at these attacks. The U.S. will suffer from more credit card and debit card fraud, some in-store, but more shifting towards online sites as the chip-on-card initiative forces thieves to adapt.

Exploiting IoT Devices
Hacking home Internet-of-Things (IoT) devices, the ones always connected to the Internet, is easy for botnet herders looking to amass an army to conduct DDoS attacks. But there is little money in attacking. Some will adjust to provide ‘protection’ extortion schemes. Others will move into using those simple devices to create social media accounts which can ‘follow’ or ‘like’ in mass for a fee. Early signs are already present as buying followers/likes is lucrative business in the ego-markets of social media.

Looking down the road a bit, we will actually see fewer random attacks against IoT devices. Two factors are at play, in the future. First, IoT device manufacturers and consumers will shift to close the basic weakness currently seen; the use of default passwords. The second change will be when professional hackers, likely organized criminals and nation states, take over the market with more professional hacking capabilities. They tend to not play nice with others. Upon compromising an IoT device, they will immediately close the vulnerability so they are not displaced by another hacker. This ensures they keep control of their victim.

We will see more creative ways for attackers to monetize this resource by coupling with ransomware, DDoS attacks, data leakage, creation of mass accounts to facilitate fraud, and perhaps even creating specialty routing networks to obfuscate traffic. The result is more devices exploited, but in a more organized manner, until such time as the IoT industry becomes much more secure overall.

In the next blog, Cybercriminals Next Targets: Long Term Prizes (part 2 of 2), I will share what cybercriminals will target in the long-term. There are many opportunities for them to choose from which could reap big payouts. They are a greedy lot and I expect them to make bold moves.

Interested in more? Follow me on Twitter (@Matt_Rosenquist), Steemit, and LinkedIn to hear insights and what is going on in cybersecurity.

Also read: Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)

Share this post via:


There are no comments yet.

You must register or log in to view/post comments.