Categories: CyberCrimeSecurity

The New Cyberattacks Threatening Public Sector Companies

The second quarter of 2015 was riddled with high profile vulnerabilities and hacks, with cybercriminals becoming more creative in their attack methods.

This was the finding of a study by Trend Micro, ‘A Rising Tide: New Hacks Threaten Public Technologies’, which detailed the evolution of tools and methods attackers use to get the greatest return on every cybercrime investment.

Shift in threat landscape

Raimund Genes, CTO, Trend Micro, said: “In the second quarter, we saw a shift in the threat landscape with cyber criminals becoming more sophisticated and creative, amplifying existing methods of attack, and using them in new ways.

“The ethereal outlook on the threat of cybercrime can no longer be held by the general population. This quarter demonstrated that the potential damage caused by cyber attacks extends far beyond a simple software bug to hacks of airplanes, smart cars and television stations.”

Hackers are taking more strategic approaches, refining their approach and targeting more selective victims to improve their infection rates, according to the study. This is reflected by the exponential increase in the use of several traditional attack methods, including a 50 percent increase in the integration of the Angler exploit kit, a 67 percent growth in overall exploit kit-related threats, and CryptoWall ransomware becoming highly targeted, with 79 percent of infections occurring in the US.

Government entities have realised the full impact of cyberattacks during the second quarter with massive data breaches on both the Internal Revenue Service (IRS) in May and the US. Office of Personnel Management (OPM) system in June. The OPM data breach was the largest of its kind to date, exposing personally identifiable information of approximately 21 million individuals. Other government agencies were impacted by targeted campaigns using macro malware, new command and control (C&C) servers, and the continued use of newly exploited vulnerabilities and zero-days Pawn Storm.

When looking at the Q2 threat landscape as a whole, the US. is a major player in both deploying and receiving various attacks, with malicious links, spam, C&C servers and ransomware are all having a major presence.

How much do you know about hacking and viruses? Take our quiz!

Duncan Macrae

Duncan MacRae is former editor and now a contributor to TechWeekEurope. He previously edited Computer Business Review's print/digital magazines and CBR Online, as well as Arabian Computer News in the UAE.

Recent Posts

Google Announces Quantum Chip Error ‘Breakthrough’

Google Willow quantum chip makes significant improvements in error correction, moving quantum computing closer to…

12 mins ago

TikTok Asks For Emergency Pause On US Divestiture Law

TikTok, ByteDance ask court for emergency injunction to pause enforcement of divestiture law pending Supreme…

42 mins ago

OpenAI Seeks To Remove Commercial ‘AGI’ Constraint

ChatGPT developer OpenAI reportedly discussing removal of provision that blocks Microsoft from accessing super-intelligent AI

22 hours ago

EU Probes Nvidia AI Chip Business Practices

European Commission reportedly questions Nvidia competitors, customers over business practices in AI chip market over…

22 hours ago

Apple To Begin Using In-House 5G Modems Next Year

Apple reportedly planning to use first-generation in-house 5G modem in iPhone SE next year, hopes…

23 hours ago

EU Probes TikTok Influence On Romania Elections

European Commission queries TikTok for information on alleged Russian campaign to influence Romanian presidential election

23 hours ago