Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

McAfee Unveils Threat Predictions for 2012

McAfee has come forward with its list of 2012 threat predictions, part of a longstanding tradition in the InfoSec community, which outline what it sees as the largest obstacles to personal and organizational security in the coming year.

McAfee Logo

McAfee has come forward with its list of 2012 threat predictions, part of a longstanding tradition in the InfoSec community, which outline what it sees as the largest obstacles to personal and organizational security in the coming year.

McAfee Logo

“Many of the threats that will become prominent in 2012, have already been looming under the radar in 2011,” said Vincent Weafer, senior vice president of McAfee Labs.

“Over the past year, the general public has become more aware of some of these risks, such as threats to critical infrastructure or the impact of hacktivism as they gain international media attention. In the meantime we continue to see cybercriminals improving their toolkits and malware and are ready to make a significant impact in 2012.”

McAfee’s Top Threats to Watch for in 2012 include:

Industrial Attacks

Water, electricity, oil, and gas are essential to people’s everyday lives, yet many industrial systems are not prepared for cyberattacks. As with recent incidents directed at water utilities in the United States, attackers will continue to leverage this lack of preparedness, if only for blackmail or extortion in 2012.

Mobile Threats: Attackers will bypass PCs

In 2012, mobile attackers will improve on their skill set and move toward mobile banking attacks. McAfee Labs expects attackers will bypass PCs and go straight after mobile banking apps, as more and more users handle their finances on mobile devices.

Advertisement. Scroll to continue reading.

Hacktivism

2012

Joining forces online and on the front lines McAfee Labs predicts that in 2012, either the “true” Anonymous group will reinvent itself, or die out. Additionally, those leading the digital disruptions will join forces with physical demonstrators, and will target public figures such as politicians, industry leaders, judges and law-enforcement, more than ever before.

Cyberwar: Flexing its muscles

Will 2012 be the year of Cyberwar, or merely a showcase of offensive cyberweapons and their potential? McAfee hopes it’s only the latter, but says the situation’s growth during recent years makes an eventual cyberwar nearly inevitable.

Countries are vulnerable due to massive dependence on computer systems and a cyberdefense that primarily defends only government and military networks. Many countries realize the crippling potential of cyberattacks against critical infrastructure, such as water, gas and power, and how difficult it is to defend against them. McAfee Labs expects to see countries demonstrate their cyberwar capabilities in 2012, in order to send a message.

Rogue Certificates

Untrustworthy and undetectable Organizations and individuals tend to trust digitally signed certificates, however, recent threats such as Stuxnet and Duqu used rogue certificates to evade detection. McAfee Labs expects to see the production and circulation of fake rogue certificates increase in 2012. Wide-scale targeting of certificate authorities and the broader use of fraudulent digital certificates will affect key infrastructure, secure browsing and transactions as well as host-based technologies such as whitelisting and application control.

Embedded Hardware: The Promised Land for sophisticated hackers

Embedded systems are designed for a specific control function within a larger system, and are commonly used in automotive, medical devices, GPS devices, routers, digital cameras and printers. McAfee Labs expects to see proofs-of-concept codes exploiting embedded systems to become more effective in 2012 and beyond. This will require malware that attacks at the hardware layer, and will enable attacks to gain greater control and maintain long-term access to the system and its data. Sophisticated hackers will then have complete control over hardware.

Advances in Operating Systems Moves Hackers “Down and Out”

New security features baked into the core of the operating system will cause hackers to find alternate entryways: down into the hardware and out of the operating system.

Attacking hardware and firmware is not easy, but success allows attackers to create persistent malware in network cards, hard drives and even system BIOS (Basic Input Output System). McAfee Labs expects to see more effort put into hardware and firmware exploits and their related real-world attacks through 2012.

DNSSEC will Drive New Network Threat Vectors

DNSSEC was designed to protect name-resolution services from spoofing and cache poisoning by using a “web of trust” based on public-key cryptography to prevent a client computer from inadvertently communicating with a host as a result of a “man-in-the-middle” attack. Such an attack redirects the traffic from the intended server (Web page, email, etc.) to another server.

Unfortunately, DNSSEC would also protect from spoofing and redirection any attempts by authorities seeking to reroute Internet traffic destined to websites that are trafficking in illegal software or images. For a government to redirect traffic, it would need to be considered authoritative from the root-level domains, which is a level of trust that other governing bodies would hesitate to grant if they knew that the result would be the suppression of Internet content based on the opinions of foreign governments.

Governing bodies around the globe are taking greater interest in establishing “rules of the road” for Internet traffic, and McAfee Labs expects to see more and more instances in which future solutions are hampered by legislative issues. The result, McAfee says, is that the Internet of tomorrow will probably look like the Internet of yesterday for a longer time than the security industry would like to see.

For the curious, McAfee’s 2012 Threat Predictions report can be downloaded directly here

At SecurityWeek, we have put our own fortune-telling abilities to good use and pulled together five interesting predictions of our own with input from some of the security vendors.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.