Connect with us

Hi, what are you looking for?

HEADLINES

Cyber criminals continue to use new tactics in carrying out attacks – Symantec

Cyber criminals continue to use new tactics in carrying out attacks. This is according to the 2017 Symantec’s Internet Security Threat Report (ISTR), which provides a view of the threat landscape, including insights into global threat activity, cyber criminal trends and motivations for attackers.

“New sophistication and innovation are the nature of the threat landscape, but this year Symantec has identified seismic shifts in motivation and focus,” said Peter Sparkes, senior director, Cyber Security Services, Asia-Pacific and Japan at Symantec.

Cyber criminals continue to use new tactics in carrying out attacks. This is according to the 2017 Symantec’s Internet Security Threat Report (ISTR), which provides a view of the threat landscape, including insights into global threat activity, cyber criminal trends and motivations for attackers.

“New sophistication and innovation are the nature of the threat landscape, but this year Symantec has identified seismic shifts in motivation and focus,” said Peter Sparkes, senior director, Cyber Security Services, Asia-Pacific and Japan at Symantec.

Various cyber crimes were already widely covered by the media, including multi-million dollar virtual bank heists, attempts to disrupt the US electoral process by State-sponsored groups and the Distributed Denial of Service (DDoS) attacks using a botnet of Internet of Things (IoT). All these, according to the report, show “how skilled cyber criminals are in executing these crimes”.

“New sophistication and innovation are the nature of the threat landscape, but this year Symantec has identified seismic shifts in motivation and focus,” said Peter Sparkes, senior director, Cyber Security Services, Asia-Pacific and Japan at Symantec.

According to Sparkes, there is a new trend in cyber espionage that is causing an alarming increase in targeted attacks aimed at political manipulation and sabotage, with cyber criminals exploiting simple IT tools and cloud services. Cyber attacks against the US Democratic Party and the subsequent leak of stolen information are examples of these tactics that are being used to disrupt and influence election processes, and destabilized targeted organizations and countries.

Financial theft carried out virtually on the financial sector with billions of dollars stolen by cyber criminals is also becoming a major issue. Aside from the work of criminals, Sparkes said that for the first time, Symantec also observed indications of the involvement of nation states in this cyber crime.

Another target for disruption is the IoT, which is attacked using the Mirai botnet within two minutes of connecting to the Internet, showing that devices connected to the Internet can easily be attacked.

Advertisement. Scroll to continue reading.

The use of e-mail, meanwhile, has similarly become the weapon of choice for cyber criminals. Symantec found one in 131 emails contained a malicious link or attachment, the highest rate in five years.

Cyber criminals also use PowerShell, a scripting language installed in PCs, and Microsoft Office files as weapons. They used this as it leaves a lighter footprint and offers the ability to hide in plain sight.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In a new report covering Q2 2024 – Q1 2025, Kaspersky has found over 250,000 cyberattacks disguised as popular anime among other shows and streaming platforms...

HEADLINES

From January to December 2024, Kaspersky solutions used by businesses here detected and blocked more than 53 million bruteforce attacks. 

HEADLINES

According to Kaspersky experts, 2024 saw over 3 billion malware attacks globally, with a daily average of 467,000 malicious files detected. Windows systems were...

HEADLINES

Cybercriminals target SMBs, schools, and other smaller organizations because they often have less robust security compared to large corporations and other institutions. 

HEADLINES

Sophos Counter Threat Unit revealed the NICKEL TAPESTRY threat group’s scheme involving fraudulent workers operating on behalf of North Korea (formally known as the...

HEADLINES

PRSP is a staunch advocate of communication based on honesty and integrity. While our role is to uphold and strengthen the reputation of our...

HEADLINES

Poor password management is compounded by a reliance on common combinations of names, dictionary words and numerals. Not only are these passwords relatively easy...

White Papers

This demonstrates that despite a slight improvement from last year, cybersecurity preparedness remains low as hyperconnectivity and AI introduce new complexities for security practitioners.

Advertisement