Symantec announces its 2013 cybersecurity predictions which emphasize that Egyptian organizations and individuals continue to be a target for cybercrime attacks. According to Symantec’s 2011 Global Internet Security Threat Report, Volume 17, Egypt’s global ranking was on the rise due to an increase in online and mobile internet activity, as well as rapid adoption of social networking across the country. Egypt also experienced a dramatic shift in its global ranking from 42 in 2010 to 27 in 2011 and ranked second across Europe, the Middle East, and Africa as a source for malicious online activity.
“In 2013, we foresee a continued rise in targeted attacks in Egypt with financial and political motivation. In addition to traditional cybercrime, Egypt’s surge in internet users across social media and mobile devices may create a new avenue for increasingly sophisticated incidents,” said Justin Doo, cloud and security practices director for Middle East and North Africa, Symantec. “On a global scale, malicious cyber attacks rose by 81 percent in 2011, and as this trend continues organizations in Egypt need to be vigilant about protecting their information by understanding their risk posture and deploying security policies and technologies to minimize the threats.”
Increase in Cyber Conflicts
Conflicts between nations, organizations and individuals will play an integral role in the cyber world. Nations or organized groups of individuals will continue to use cyber tactics in an attempt to damage or destroy the secure information or funds of its targets. In 2013, we will see the cyber equivalent of saber rattling, where nation states, organizations, and even groups of individuals use cyber attacks to show their strength and “send a message.”
Ransomware is the new Scareware
Fake antivirus has begun to fade as a criminal enterprise, and a new and harsher model has emerged: ransomware – which infects a computer system and restricts access until a ransom is paid to the creator of the malware. Ransomware goes beyond attempting to fool its victims; it attempts to intimidate and bully them. In 2013, attackers will use more professional ransom screens, up the emotional stakes to motivate their victims, and use methods that make it harder to recover data once compromised.
Mobile Adware Exposed
Mobile adware, or “madware,” disrupts the user experience and can potentially expose location details, contact information, and device identifiers to cybercriminals. Madware–which sneaks onto a user device when they download an app–often sends pop-up alerts to the notification bar, adds icons, changes browser settings, and gathers personal information. In the past nine months, the number of apps including the most aggressive forms of madware has increased by 210 percent. Because location and device information can be legitimately collected by advertising networks, Symantec expects increased use in madware as more companies seek to drive revenue growth through mobile ads.
Monetization of Social Networks Introduces New Dangers
As consumers, we place a high level of trust in social media–from the sharing of personal details, to spending money on game credits, to gifting items to friends. As these networks start to find new ways to monetize their platforms by allowing members to buy and send real gifts, the growing social spending trend also provides cybercriminals with new ways to lay the groundwork for attack. Symantec anticipates an increase in malware attacks that steal payment credentials in social networks and trick users into providing payment details, and other personal and potentially valuable information, to fake social networks.
Attackers Will Shift to Mobile and Cloud
As unmanaged mobile devices continue to enter and exit corporate networks and pick up data that later tends to become stored in other clouds, there is increased risk of breaches and targeted attacks on mobile device data. Some mobile malware duplicates old threats, like stealing information from devices. But it also has created new twists on old malware. Today mobile malware sends premium text messages to accounts that bad guys can profit from. In 2013 you can be sure that mobile technology will continue to advance and thereby create new opportunities for cybercriminals. In addition, the increase in mobile computing will strain the SSL mobile infrastructure in 2013 and reveal a core issue: Internet activity on mobile browsers is not subject to proper SSL certificate handling. To exacerbate the problem, much of this mobile Internet usage is being handled by unsecure mobile applications, which brings additional risk to the table, such as man-in-the-middle attacks.
Source: Zawya.Com – Press Release – 2 January 2013