Targeted threat

Targeted threats are a class of malware destined for one specific organization or industry. A type of crimeware, these threats are of particular concern because they are designed to capture sensitive information. Targeted attacks may include threats delivered via SMTP e-mail, port attacks, zero day attack vulnerability exploits or phishing messages. Government organisations are the most targeted sector.[1] Financial industries are the second most targeted sector, most likely because cybercriminals desire to profit from the confidential, sensitive information the financial industry IT infrastructure houses.[2] Similarly, online brokerage accounts have also been targeted by such attacks.[3]

Impact

The impact of targeted attacks can be far-reaching. In addition to regulatory sanctions imposed by HIPAA, Sarbanes-Oxley, the Gramm-Leach-Bliley Act and other laws, they can lead to the loss of revenue, focus and corporate momentum. They not only expose sensitive customer data, but damage corporate reputations and incur potential lawsuits.[4]

Detection and prevention

In contrast to a widespread spam attack, which are widely noticed, because targeted attacks are only sent to a limited number of organizations, these crimeware threats tend to not be reported and thus elude malware scanners.[5]

Examples

External links

Notes

  1. http://www.symantec.com/connect/blogs/targeted-attacks-now-using-bredolab-malware
  2. Symantec Corp., Symantec Internet Security Threat Report, Vol X, Sep. 2006, p. 9.
  3. Security and Exchange Commission. "Online Brokerage Accounts: What You Can Do to Safeguard Your Money and Your Personal Information." http://www.sec.gov/investor/pubs/onlinebrokerage.htm
  4. Williams, Amrit T., Hallawell, Arabella, et al., "Hype Cycle for Cyberthreats, 2006", Gartner, Inc., Sept. 13, 2006, p. 17
  5. Shipp, Alex quoted in Gibbs, Wayt. "The Rise of Crimeware.", February 23, 2006. http://blog.sciam.com/index.php?title=the_rise_of_crimeware
  6. Williams, Dan. "Israel holds couple in corporate espionage case." "http://www.computerworld.com/securitytopics/security/virus/story/0,10801,108225,00.html?from=story_kc, Jan. 31, 2006
  7. Symantec Corp., Symantec Internet Security Threat Report, Vol X, Sep. 2006, p. 4.
  8. Avinti, Inc. "Targeted Destination Attacks." Sep. 2005. http://www.avinti.com/download/labs/targeted_destination.pdf
This article is issued from Wikipedia - version of the Tuesday, March 08, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.