quinta-feira, 30 de abril de 2015

Cybercrime Gets Smarter and More Complex




There are 85,000 New Malicious IPs Launched Every Day and the Top Phishing Targets are Technology Companies and Financial Institutions. These are Among the Findings of a New Report from Threat Intelligence and Security Company, Webroot. The Webroot 2015 Threat Brief, Provides the Latest Cyber Threat Trends Collected from 10s of Millions of Users and over 30 Security Technology Partners. The Report Finds that, the United States Accounts for 31% of Malicious IP Addresses, Followed by China with 23% and Russia with 10%. Overall, Half of Malicious IP Addresses are Based in Asia. It Shows a 30% Chance of Internet Users Falling for a 0-Day Phishing Attack in the Course of a Year and Indicate a More than 50% Increase in Phishing Activity in December 2014, Most likely Due to the Holiday Season. On Average, there are Nearly 900 Phishing Attempts Detected per Financial Institution but, over 9,000 Attempts Detected per Technology Company. The Top 5 Technology Companies Impersonated by Phishing Websites are: Google, Apple, Yahoo, Facebook and Dropbox. Looked at by Country, the US is by Far the Largest Host of Phishing Websites, with over 75% being within its Borders. Looking at Mobile Systems, the Report Finds that, on Average, Only 28% of Apps on the Android Platform were Trustworthy or Benign, a Drop from 52% in 2013.


Almost Half were Rated Moderate or Suspicious and over 22% were Unwanted or Malicious. Trojans Make Up the Vast Majority of Malicious Threats, Averaging 77% for 2014. "Webroot has seen a continued rise in the number of malicious URLs, IP addresses, malware and mobile applications used to enable cybercriminals to steal data, disrupt services, or cause other harm", Says Hal Lonas, Chief Technology Officer at Webroot. "With more breaches at major retailers, financial institutions and technology companies in the headlines and scores of other, smaller breaches in 2014, the trend shows no signs of slowing down. The Webroot 2015 Threat Brief highlights the need for highly accurate and timely threat intelligence to help organizations assess the risk of incoming data, reduce the volume of security incidents, and accelerate response to successful attacks". 2014 has also Seen More Sophisticated Techniques being Used to Attack PCs. These include the Poweliks Registry Exploit which Doesn't Require Extra Components to Deliver Infections like Ransomware. Webroot also Discovered 5 New Families of Potentially Unwanted Applications, Each Demonstrating New Social Engineering Techniques and Complexity.




The Full Report is Available as a PDF from the Webroot Website and there's a Summary of the Findings in Infographic Form, below:

http://www.webroot.com/shared/pdf/Webroot_2015_Threat_Brief.pdf



0 comentários:

Enviar um comentário