ENISA’s Threat Rankings: From Malware To Cyber Spies

When it comes to cybersecurity, what should you really be worried about? Europe's computer security agency has set out a list of the top threats in the online world, warning that hacking for profit is one of the biggest trends.

"Undoubtedly, optimisation of cybercrime turnover was the trend observed in 2016. And, as with many of the negative aspects in cyberspace, this trend is here to stay. 

The development and optimisation of badware towards profit will remain the main parameter for attack methods, tools and tactics," warned the report from the European Union Agency for Network and Information Security (ENISA).

It said criminals had been using unsecured Internet of Things (IoT) devices to launch giant distributed denial of service (DDoS) attacks, and have launched extortion attacks against commercial organisations that have "achieved very high levels of ransom and high rates of paying victims", and demonstrated the ability to affect the outcome of democratic processes like the US presidential elections.

Executive director of ENISA Udo Helmbrecht said: "As we speak, the cyber threat landscape is receiving significant high-level attention: it is on the agenda of politicians in the biggest industrial countries. This is a direct consequence of 'cyber' becoming mainstream, in affecting people's opinions and influencing the political environment of modern societies."

Malware tops ENISA's lists, with over 600 million samples identified per quarter, and mobile malware, ransomware, and information stealers the main areas of criminal malware innovation.

"Equally impressive was the fact that state-sponsored threat actors have launched malware that has had high efficiency by exploiting quite a few zero-day vulnerabilities," the report said.

It noted that the average lifespan of malware hashes, the unique identification of a malware variant used by malware detection tools, has shrunk so much that a specific malware variant might exist for just one hour.

Source: ENISA

"This is indicative of the speed of malware mutation in order to evade detection on the one hand, and one of the reasons for gaps in end-point protection measures (i.e. anti-virus software)," it said.

The report also blamed the availability of 'malware-as-a-service' offerings, which allow users to rent the infrastructure for a few thousand dollars per month to launch, for example, ransomware attacks with $100,000 monthly revenues.

The report said that DDoS attacks, once used by activists to disrupt corporate websites, are now being used for extortion attempts, part of the trend toward monetising hacking. Similarly, the report noted that phishing has successfully reached the executive level: CEO fraud is now causing significant losses to companies.

And while it may be a surprise that, following the controversy around the US presidential election, ENISA ranked cyber-espionage at the bottom of its list, it noted: 

"Known/confirmed cases are the top of the iceberg. This is because espionage campaigns are difficult to identify. And once identified are difficult/costly to analyse. It is believed that cyber-espionage is the motive of much more undetected campaigns. To this extent, the assessed descending trend of this threat may not be fully valid. 

“Secondly, cyber-espionage is much targeted: it uses the same methods as cyber-crime, but it possesses intelligence allowing it to lure victims much more efficiently."

ZDNet

A Common Language For Sharing Intelligence On Cybersecurity Threats:

Navigating The Cyber-Threat Landscape:

EU Will Fund Car, Hospital & Airport IT Security:

 

 

 

 

« US Buys Mysterious ISIS Drone Killer
Geolocation, Russian Hackers & False Flag Operations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

National Cyber Security Centre (CNCS) - Portugal

National Cyber Security Centre (CNCS) - Portugal

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Crypsis

Crypsis

Crypsis was built based on a shared vision of creating a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

Pristine InfoSolutions

Pristine InfoSolutions

Pristine InfoSolutions is a global IT services and Information Security Company focused on delivering smart, next-generation business solutions.

Herzing College

Herzing College

Herzing College Ottawa offers an accelerated 12-month Cybersecurity Specialist training program. This program is developed by industry experts and based on leading IT security certifications.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

Skylark

Skylark

Skylark is a leading global IT services provider, transforming client’s businesses through innovative and advanced technology solutions.