Subscribe
  • Home
  • /
  • Malware
  • /
  • Trend Micro Q1 2015 roundup finds new variations on proven attack methods

Trend Micro Q1 2015 roundup finds new variations on proven attack methods

Healthcare, iOS, Adobe, POS targeted by malware, zero-day exploits.


Johannesburg, 20 May 2015

A combination of newer and older threat variations defined the cyber security landscape in the first quarter of 2015. Malvertising, zero-day vulnerability exploitation, "old-school" macro malware and the decade-old FREAK vulnerability are just a few of the highlights in Trend Micro's (TYO: 4704; TSE: 4704) new report: "Bad Ads and Zero-Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices".

From an industry perspective, healthcare and retail point-of-sale (POS) systems have also seen an uptick in threat activity. The report reinforces how complacency can present major cyber security risks in an era where the margin for error has been significantly diminished.

"Even though we are early in the year, it is clear 2015 is shaping up to be noteworthy in terms of the volume, ingenuity and sophistication of attacks," said Raimund Genes, CTO, Trend Micro. "The rise in attacks against the healthcare industry, combined with the rise in malvertisements, reflects that technology users are being assailed from all angles. It is clear businesses and individuals alike need to be proactive in protecting against threats. As a business, what would your IT security policies look like in a zero trust environment? An aggressive and alternative security posture is critical to keep financial, personal and intellectual property safe."

Adware also topped the list of mobile threats, with Trend Micro now documenting more than five million Android threats to date - nearing the predicted total of eight million by the close of 2015. In fact, top malicious and high-risk apps blocked by Trend Micro were adware related, reflecting this increase.

Trend Micro researchers also found zero-day exploits targeting Adobe software utilised malvertisements and no longer required victims to visit or interact with malicious sites to become infected.

The healthcare industry experienced a notable rise in cyber attacks, in addition to iOS and POS systems continuing to be targeted. Since exploitations in these areas have been in their infancy for several years, researchers believe this rise is primarily due to a lack of preparedness - a sizable oversight that should be addressed.

"The question we have to ask is: 'Are we doing enough to protect ourselves from security threats?'," says Gregory Anderson, country manager, Trend Micro South Africa. "While we need to constantly update our systems to protect against new attacks, the first quarter of 2015 clearly showed we also need to watch out for older threats, and that no industry or system should feel exempt."

Report highlights include:

* Healthcare industry hit by massive attacks: Major healthcare service providers, such as Premera Blue Cross and Anthem, suffered data breaches that exposed millions of customers' financial and medical data.
* Old threats invigorated with new targeted attack tools, tactics and procedures: Rocket Kitten and those behind Operation Pawn Storm set their sights on new targets, proving that targeted attacks are evolving.
* Exploit kits grew in sophistication: Exploit kits constantly add new exploits to their arsenals, adding to their allure to expert and novice attackers.
* Crypto-ransomware volume soared, expanded to enterprises: Crypto-ransomware expanded their target base to enterprise users, no longer exclusively pursuing consumers.
* Macro malware, old but still effective: The resurgence of macro malware suggested cyber criminals are taking advantage of user security complacency, through reliance on Microsoft Office defaults.
* Decade-old FREAK security flaw brought on patch management challenges: As more vulnerabilities emerge in open source OSes and applications, IT administrators will find it increasingly difficult to mitigate risks.

For the complete report, please visit: http://www.trendmicro.com/vinfo/us/security/roundup/.

A blog post regarding the report can be viewed here: http://blog.trendmicro.com/1q-2015-security-roundup/.

Share

Trend Micro

Trend Micro (TYO: 4704), a global leader in security software, strives to make the world safe for exchanging digital information. Its solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. Leveraging these solutions, organisations can protect their end-users, their evolving data centre and cloud resources, and their information threatened by sophisticated targeted attacks.

All of the solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network, and are supported by over 1 200 threat experts around the globe.

For more information, visit www.trendmicro.com.

Editorial contacts

Charlene Carroll
Anti-Clockwise
(+27) 11 314 2533
Charlene@anticlockwise.co.za