Training

IT threat quarter

by Mark Rowe

In their latest report, an IT security company has analysed the development of IT threats in the first quarter of 2013. The first three months of the year turned out to be full of incident, especially when it came to cyberespionage and cyberweapons, according to Kaspersky Lab .

At the very beginning of the year, the IT firm published a report with the results of a study into five-year global cyberespionage operations. The operation was dubbed Red October . These attacks targeted various government agencies, diplomatic organisations and companies around the world. In addition to workstations, Red October was also capable of stealing data from mobile devices, gathering data from network equipment, collecting files from USB drives, stealing email databases from local Outlook archives or from remote POP/IMAP servers and extracting files from local FTP servers on the Internet.

In February a new malicious program, dubbed MiniDuke , appeared on the scene. It penetrated systems using a zero-day vulnerability in Adobe Reader (CVE-2013-0640). An investigation into incidents involving this piece of malware was conducted by Kaspersky experts in conjunction with the Hungarian company CrySys Lab. MiniDuke’s victims turned out to be government agencies located in Ukraine, Belgium, Portugal, Romania, the Czech Republic and Ireland, as well as a research organisation in Hungary, a research institute, two scientific research centres and a medical facility in the US. In total, Kaspersky detected 59 victims in 23 countries.

February also saw the publication of an extensive PDF report by Mandiant on a series of attacks launched by a group of Chinese hackers going by the name of APT1. Mandiant states that APT1 appears to be a division of the Chinese army. This is not the first time Beijing has been accused of complicity in cyberattacks against government agencies and organisations in other countries. And there is nothing particularly surprising about the Chinese government’s firm rejection of the claims made in the Mandiant report. Following on in late February, Symantec published a study on a newly identified “old” version of Stuxnet — Stuxnet 0.5. It turned out to be the earliest known modification of the worm, and was active between 2007 and 2009. Experts have repeatedly stated that there were (or still are) earlier versions of the notorious worm, but this represents the first hard evidence.

Dennis Maslennikov, Senior Malware Analyst at Kaspersky Lab, said:
“The first quarter of 2013 brought a huge number of major incidents related to cyberespionage and cyberweapons. Incidents that require months of relentless investigation are relatively rare in the antivirus industry. Even rarer are events that remain relevant three years after they take place — like the detection of Stuxnet, for example.

“Although this worm has been studied by numerous antivirus vendors, there are still lots of modules that have only been examined briefly, if at all. The study of Stuxnet version 0.5 has provided more information about this malicious program in general. It’s likely that we’ll find even more information in the future. The same can be said about the other cyberweapons detected after Stuxnet, as well as malware used in cyberespionage — there’s a lot we still don’t know.”

The first quarter of 2013 also saw more targeted attacks against Tibetan and Uyghur activists. The attackers appeared to be using everything at their disposal to achieve their goals, and users of Mac OS X, Windows, and Android were subjected to attacks.

In 2011, we witnessed mass hacks of several companies and some major leakage of users’ data. It might seem like these attacks came to nothing — but not so! Cybercriminals remain as interested as ever in hacking large companies and getting their hands on confidential data, including user information. In the first quarter of 2013 victims included Apple, Facebook, Twitter, and Evernote, among others.

The mobile threat front was also full of incident in Q1 2013. January may have been a quiet month for mobile virus writers, but over the next two months Kaspersky Lab detected in excess of 20,000 new mobile malware modifications, which is equivalent to roughly half of all the malware samples detected over the whole of 2012.

There were also minor changes to the threat geography. This time around, Russia (19 per cent, -6 percentage points) and the US (25 per cent, +3 percentage points) once again switched places in the ratings in terms of malicious hosting services — the US returned to first place. The percentages of other countries were more or less unchanged from Q4 2012. The rating of the most prevalent vulnerabilities saw no significant shifts. Java vulnerabilities are still on top, detected on 45.26 per cent of all computers. On average, Kaspersky experts counted eight different breaches on every vulnerable machine.

You can read the full version of the report on the evolution of IT threats in Q1 2013 at securelist.com

Related News

  • Training

    Forensic science path

    by Mark Rowe

    After eight years of working in estate agency, University of Derby graduate, Mandy Stephens, took a new career path: forensic science. Mandy…

  • Training

    Network video day

    by Mark Rowe

    The network video product company Axis Communications is running its next Axis Partner Showcase open day, on Wednesday, October 11, at Tatton…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing