5 Big Security Threats you could face in 2015

2014 was completely disastrous from a security point of view for companies and people alike. Apple’s iCloud breach saw private celebrity photos leaked, the most memorable security breach of 2014 was Sony Pictures who was   thanks to a breach in Apple’s iCloud, Sony Pictures was the victim of it all but crippled the company and the public at large found itself trying to grapple with exploits like and . So what can we expect from 2015?

According to FortiGuard Labs, the threat research division of network security company, the threats could be stronger and more diverse than ever before. As the number of devices connected to the network increase, cyber criminals will continue to hone their prowess when it comes to IoT attacks and advanced evasion techniques, while also continuing to exploit large-scale server side vulnerabilities for financial gains and other nefarious purposes. Businesses and government organisations globally are at risk, as are consumers’ important personal information.

It has outlined five top threats, as well as actions that can be taken to limit damage as much as possible.

1. Blastware to destroy systems, erase data and cover hacker tracks

This destructive new trend of malware, following Scareware and Ransomware could lead to the ability for hackers to infiltrate systems, gather data and then wipe out the information to on systems and hard drives to cover tracks and thwart forensics. The first indications of Blastware were observed in 2014 in the guise of Dorkbot/NGRbot, where the hackers had code routines built in, that if altered, would self-destruct and wipe out all information on the hard drive.

This is a direct counter response to the rise of incident response services. Fortinet predicts that APT developers will build in sophisticated self-destruct mechanisms in seek and destroy fashion that could hamper law enforcement and forensics efforts as these resources increase to fight cyber crime. Hackers may also seek to use these tactics for ransom – i.e. to destroy data if ransom isn’t paid in a certain timeframe.

2. Hackers look to evade law enforcement, frame the innocent

As cyber crime increases, law enforcement practices to catch and penalize perpetrators increase with it. Thus, hackers must be more careful and calculated to evade arrest. In 2015, advanced evasion techniques will evolve in order for attackers to cover their tracks.

To date, evasion has been currently focused on counter antivirus and intrusion prevention/antibotnet. Fortinet predicts this will evolve with a focus on Sandbox evasion. In addition, similar to counter intelligence, it is possible that attackers will frame the innocent by throwing more red herrings into their attacks to thwart investigators and intentionally planting evidence that point to an unassociated attacker.

3. Internet of Things Becomes Internet of Threats (IoT)

In 2014, we saw an interesting shift — namely Heartbleed and Shellshock — focused on server side vulnerability and exploitation. Looking forward to 2015, Fortinet fully expects this trend to continue in an alarming way as black hat hackers pry open the Internet of Things. Hackers will continue to follow the path of least resistance as more and more devices are connected to the network. Vulnerabilities that Black Hat hackers will look to exploit will include Consumer home automation and security systems, as well as webcams, which we are already beginning to see.

On the Enterprise side, Network Attached Storage and Routers will continue to be targets, as will critical infrastructure such as Human Machine Interfaces (HMI) and Supply Chain systems, which will create significant problems with third-party components and patch management. Common malware distributed and sold will include SCADA functionality, such as Havex’s OPC routine that would fingerprint devices used in industrial networks, and report this back to users.

4. Denial of revenue/data breaches continue and expand

2014 became known as the “year of the data breach,” with significant thefts from stores like Target, Michaels, P.F. Changs and Home Depot. This trend will likely continue in 2015 as hackers become more sophisticated and find new loopholes for infiltrating retail and financial systems. In the New Year, damages will also extend to denial of service on assembly line, factory, ERP/SAP systems, as well as healthcare and building management, creating even more challenges in the way of critical consumer data compromises, revenue losses and reputation damages for organisations globally.

5. Rise in counter threat intelligence

Crime services and solutions have already supported QA for malware, including sample scanning. According to Fortinet, this is likely to extend to support QA for threat intelligence and undetected coverage for indicator of compromise (IOC) in 2015. As crime services extend their research and coverage, hackers will utilize the same type of processes for determining the best ways to bypass security systems. For example, current crime services scan malware against vendors’ capabilities to stop it, and give them a score result.

Actions threat intelligence and network security vendors must take in order to protect against new threats:

Actionable threat intelligence

Security vendors are overloaded with threat intelligence, but technology must integrate to automate protection against that intelligence and not rely on administrative decision. In 2015, cyber security vendors and managed security solutions will make an even greater push toward actionable threat intelligence, with proactive services that filter data that matters and alerts clients to their potential vulnerabilities and protection measures, prior to an attack. A vendor’s ability to ensure interoperability between different security products as well as networking, computer, storage and end devices on the network will be a key to success, by helping to create a “self-healing” network similar to SDN.

Proactive incident response

Incident response to date has generally been reactive. Moving forward, proactive response will significantly reduce damages that organizations will face in future. The selection of third-party vendors that provide more secure development through Product Security Incident Response teams, as well as deep threat research, will limit breach scenarios before they happen. Two-factor strong authentication will increase in 2015 as one simple and cost-effective proactive measure, while vendor incident response services will grow to help clients when they are under attack.

The Safest Action to Take

Luckily Multi has you covered when it comes to Security Threats. 2014 was the year of the hacker and we pre-emptively took action by aligning ourselves with the best security experts and training available. The result of which has awarded a technician with the most prestigious security certification of professional qualification and also expert qualification making him the top security technician in the country. Have a look at Multi Managed Security Services and Contact us to take advantage and be pre-emptive in your security.

Comments 3

  1. Have you ever considered publishing an e-book or guest authoring on other
    websites? I have a blog based upon on the same information you
    discuss and would really like to have you share some stories/information. I know my audience would appreciate your work.

    If you’re even remotely interested, feel free to send me an e mail.

Leave a Reply

Your email address will not be published.