ENISA’s Threat Rankings: From Malware To Cyber Spies

When it comes to cybersecurity, what should you really be worried about? Europe's computer security agency has set out a list of the top threats in the online world, warning that hacking for profit is one of the biggest trends.

"Undoubtedly, optimisation of cybercrime turnover was the trend observed in 2016. And, as with many of the negative aspects in cyberspace, this trend is here to stay. 

The development and optimisation of badware towards profit will remain the main parameter for attack methods, tools and tactics," warned the report from the European Union Agency for Network and Information Security (ENISA).

It said criminals had been using unsecured Internet of Things (IoT) devices to launch giant distributed denial of service (DDoS) attacks, and have launched extortion attacks against commercial organisations that have "achieved very high levels of ransom and high rates of paying victims", and demonstrated the ability to affect the outcome of democratic processes like the US presidential elections.

Executive director of ENISA Udo Helmbrecht said: "As we speak, the cyber threat landscape is receiving significant high-level attention: it is on the agenda of politicians in the biggest industrial countries. This is a direct consequence of 'cyber' becoming mainstream, in affecting people's opinions and influencing the political environment of modern societies."

Malware tops ENISA's lists, with over 600 million samples identified per quarter, and mobile malware, ransomware, and information stealers the main areas of criminal malware innovation.

"Equally impressive was the fact that state-sponsored threat actors have launched malware that has had high efficiency by exploiting quite a few zero-day vulnerabilities," the report said.

It noted that the average lifespan of malware hashes, the unique identification of a malware variant used by malware detection tools, has shrunk so much that a specific malware variant might exist for just one hour.

Source: ENISA

"This is indicative of the speed of malware mutation in order to evade detection on the one hand, and one of the reasons for gaps in end-point protection measures (i.e. anti-virus software)," it said.

The report also blamed the availability of 'malware-as-a-service' offerings, which allow users to rent the infrastructure for a few thousand dollars per month to launch, for example, ransomware attacks with $100,000 monthly revenues.

The report said that DDoS attacks, once used by activists to disrupt corporate websites, are now being used for extortion attempts, part of the trend toward monetising hacking. Similarly, the report noted that phishing has successfully reached the executive level: CEO fraud is now causing significant losses to companies.

And while it may be a surprise that, following the controversy around the US presidential election, ENISA ranked cyber-espionage at the bottom of its list, it noted: 

"Known/confirmed cases are the top of the iceberg. This is because espionage campaigns are difficult to identify. And once identified are difficult/costly to analyse. It is believed that cyber-espionage is the motive of much more undetected campaigns. To this extent, the assessed descending trend of this threat may not be fully valid. 

“Secondly, cyber-espionage is much targeted: it uses the same methods as cyber-crime, but it possesses intelligence allowing it to lure victims much more efficiently."

ZDNet

A Common Language For Sharing Intelligence On Cybersecurity Threats:

Navigating The Cyber-Threat Landscape:

EU Will Fund Car, Hospital & Airport IT Security:

 

 

 

 

« US Buys Mysterious ISIS Drone Killer
Geolocation, Russian Hackers & False Flag Operations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Dionach

Dionach

Dionach are a certified information security specialists who provide Penetration Testing, IT Security Auditing and Information Security Consultancy.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

Gradient Cyber

Gradient Cyber

Gradient Cyber is a trusted cybersecurity partner specializing in small businesses and mid-market enterprises concerned about cybersecurity but lacking the staff to give it the attention it deserves.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.