In world of cybercrime, IoT is the new toy: ESET study

25th December 2014
In world of cybercrime, IoT is the new toy: ESET study

2015  technology trends
Singapore,  December 25, 2014 – Global pioneer in proactive protection ESET®, has published a summary of the top cybercrime trends and predictions for 2015. While last year’s focus was on internet privacy and Android malware, new areas of InfoSecurity risks are bubbling to the top in 2015.
Says Parvinder Walia, Sales Director for APAC at ESET: “As infrastructure in Asia-Pacific region improves steadily, an increasing number of consumers are adopting technology for day-to-day tasks. Online retail is a great example of this – it’s estimated to be a $525.5 billion industry in the region. Online banking, mobile wallets, and wearable devices too are poised for similar growth and impact. As more consumers and devices connect to the internet, the risk of cybercrime is also increasing. It’s vital that we remain vigilant and continue to take proactive measures to secure our data and online activities. With the right security solutions in place, it’s possible to stay protected and feel confident online.“ said
Targeted attacks continue to become more sophisticated in 2015. Often referred to as Advanced Persistent Threats (APT), they differentiate from traditional cyber attacks. Designed to silently target a specific victim, these targeted attacks can often lurk undetected on less secure networks.
“The attack vector for targeted attacks most commonly takes advantage of social engineering attacks,” suggests Pablo Ramos, head of the research lab at ESET Latin America. “This is where psychological manipulation is used to encourage potential victims into performing actions or divulging confidential information. Attacks also take the form of zero-day exploits, where attacks exploit newly discovered vulnerability on a particular operating system or application.”
Digital payment systems attract more malware
“As users begin to adopt online payment systems as a means to pay for services and goods, these systems become more attractive to malware authors interested in financial gain,” says Ramos.
2014 saw the largest known digital payment attack to date, with a hacker reportedly harvesting more than $600,000 in Bitcoins and Dogecoins by using a network of infected machines.
We have also seen brute-force attacks, such as Win32/BrutPOS, that attempted to access password-protected accounts by hammering them with popular passwords to gain remote access - a reminder to us all to use strong, unique passwords.
Internet Of Things - new toys for hackers
As new devices connect to the Internet and store more data, they also become an attractive attack vector for cybercriminals. During 2014, we have seen more evidence of this growing trend, like attacks on cars shown on Defcon conference using the ECU devices, or the Tesla car that was hacked to open doors while in motion.
Attacks and proof of concepts were also shown on several SMART TVs, Boxee TV devices, biometric systems on smartphones, routers - not to mention Google glasses.
“This is an emerging space for cybercrime and should remain an area of focus for security industry,” adds Camilo Gutierrez, Senior Security Researcher at ESET Latin America. “While it may take years to become a serious prevalent threat, we must act now to better prevent these types of attacks.”
More information
These highlights are explored in further detail in ESET’s Cybercrime Trends & Predictions 2015 report.
The full report is now available on WeLiveSecurity.com.