Monday, May 26, 2014
Microsoft reveals shift in cybercrime tactics
Microsoft Corp has released new data indicating that as
attacks against software targets are becoming more difficult and expensive
cybercriminals are increasingly turning to deceptive tactics for malicious
purposes such as stealing people’s personal and financial information. In the
last quarter of 2013, the number of computers that had to be disinfected as a
result of deceptive tactics more than tripled from a similar period the
previous year. This increase in deceptive tactics corresponds with a 70 percent
decline in the number of severe vulnerabilities exploited in Microsoft products
between 2010 and 2013. Additionally, the increased adoption of key security
mitigations across the industry are making it more difficult and expensive for
cybercriminals to develop software exploits. Microsoft Corp director for
Trustworthy Computing, Tim Rains said: “Keeping cybercriminals on the run
requires a robust security strategy,” elaborating that “the safest houses don’t
just have locked doors. They have well-lit entry points and advanced security
systems. It’s the same with computer security - the more we layer our defenses
the better we are at thwarting attacks.” According to Microsoft’s new data, one
of the most common tactics used was deceptive downloads. These downloads were
identified as a top threat in 95 percent of the 110 countries/regions that Microsoft
data examined. Rains also said that
cybercriminals lure their victims with deceptive downloads by bundling malware
with legitimate downloadable content such as software, music or videos found
online. While the threat of deceptive downloads is on the rise, their impact is
often not seen right away. “Infected machines often continue to function, and
the only observable signs of the malicious download might be a slower computer
or unexpected search results popping up in a browser. Over time, fraudulent
activity like click fraud generated from the infected computer can tarnish an
individual’s online reputation,” he said. “Of serious concern in Africa is the
threat posed from illicit software downloaded from the internet, which is
infected with malware deliberately bundled by cybercriminals,” says Daniel
Kamau of the Anti-Piracy Lead for sub-Saharan Africa. “With
the internet population on the continent fast growing, downloading software
online is a popular alternative but can have serious consequences if it’s not
legitimate,” he said. While deceptive downloads were identified as one of the
most prevalent tactics used worldwide, ransom ware is another deceptive
practice that continues to affect people and can be devastating for those
victimized by it. Ransom ware often
pretends to be an official-looking warning from a well-known law enforcement
agency. It accuses its victim of committing a computer-related crime and
demands they pay a fine to regain control of the computer. Ransom ware is geographically concentrated,
but for cybercriminals looking to make a quick profit, the data shows it is an
increasingly alluring tactic. In fact,
the top ransom ware threat encountered globally increased by 45 percent between
the first half and the second half of 2013. In light of this new information on cyber threats,
Microsoft advises customers take a few actions to help keep themselves
protected, including using newer software whenever possible and keeping it up
to date, only downloading from trusted sources, running antivirus, and backing
up files. “Migrating to Windows 8.1 gives users a chance to modernize their
business, and prevent their systems from being attacked by malicious software.
The end of support service is an opportunity for users to build a secure and
robust working ecosystem to avoid any software compliance issues,” said Hasmukh
Chudasama, Microsoft Solutions Business Manager at Dimension Data, E.A. “Most customers who have upgraded so far have
reported that they are seeing reduced malware activity in their networks,” he
asserted. Microsoft releases its cyber
security report twice a year, which culminates data from more than a billion
systems users worldwide and some of the busiest online services. The report provides an in-depth analysis on
the latest threat trends for 110 countries/regions worldwide and is designed to
help inform people about the most prevalent global and regional threat trends
so that they can better protect themselves and their organizations.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment