Android found to b? most inf?ct?d mobil? platform but th?
rat? of g?tting inf?ct?d is r?duc?d in 2016 in contrast to pr?vious y?ars as
Android has improv?d its archit?ctur? now.
Many malicious activiti?s hav? b??n obs?rv?d by Symant?c r?lat?d
to mobil? d?vic?s about 1.4 million in 2016.
Wh?th?r it is to inf?ct victims with ransomwar?, st?al cr?d?ntials
data, d?liv?r malwar? payloads, or ?arn initial acc?ss to p?rform larg?r or sid?
attacks. Th?y g?n?rally mov? undiscov?r?d for day or ?v?n ag?s. ?mail has justifi?d succ?ss and do?s not r?ly
on vuln?rabiliti?s. It only inf?ct wh?n victims click on link provid?d.
?MAIL B?ING POPULAR CHOIC? AGAIN
It is also highlighting fact that attack?rs no long?r r?quir? d??p t?chnical
knowl?dg? to commit any crim? th?y just n??d comput?r and int?rn?t conn?ction
just b?caus? th?y ar? making us? of onlin? tools
R?port says financial criminals g?tting bigg?r and d?structiv?
day by day th?y ar? moving from traditional cr?dit card ?ra to inn?r working of
ISTR-22 m?ntions th? mov?m?nts in cyb?r ?spionag? shift b?ing
utiliz?d to caus? chaos, int?rruption, b?trayal; and also to influ?nc? th? r?sults
in th? ?l?ction syst?m, th? political control of cyb?r-attacks is ?xpanding plus
growing and nation stat?s ar? planning to b? on th? off?nsiv? wh?n targ?t?d.
It shows whil? l?ading attacks and z?ro-day vuln?rabiliti?s ?ndur?
to b? a bigg?st thr?at, cyb?r criminals ?ndur? to us? sp?ar phishing and
typical tools to bl?nd in with normal traffic.
ISTR-22-2017 hik?s s?v?ral major incid?nts and ?v?nts from
2016 includ?s th? attacks against th? Unit?s Stat?s Pr?sid?ntial ?l?ction, th?
multimillion-dollar bank br?ak-in with Bank of Banglad?sh and larg?st (DDoS)
attacks using a botn?t of Int?rn?t of Things (IoT).
This is th? lat?st addition of Int?rn?t s?curity thr?at R?port
which includ?s stat? of th? cyb?r thr?ats across th? world.
Symant?c discov?r?d first t?chnical support scam in 2010.
Attack?rs us? to trick mass?s with fals? pop-ups that dir?ct th?m to s?rious
Ransomwar? was not only thr?at p?opl? w?r? going through as
p?opl? ar? mor? towards onlin? stuff attack?rs ar? discov?ring n?w ways to lur?
FAK? T?CHNICAL SUPPORT SCAMS
In 2015, ransomwar? discov?r?d n?w obj?cts and mov?d b?yond
its targ?t on PCs to Mac, and Linux syst?ms and smart phon?s.
An ?xtr?m?ly profitabl? kind of attack Last y?ar w? ?xp?ri?nc?d
crypto ransomwar? which was bit l?ss damaging som? locking styl? ransomwar?
H?r? Cyb?rcriminal using cryptographic ?ncryption sch?m?.
RANSOMWAR? INCR?AS?D BY 35%
Vuln?rabiliti?s can com? out in almost any sort of softwar?,
but th? most alluring to addr?ss?d attack?rs is softwar? that is mostly us?d
for instanc? Adob? Flash and Int?rn?t ?xplor?r which ar? us?d on a daily basis
by a ampl? numb?r of prof?ssionals.
P?rc?ntag? of finding z?ro day vuln?rability has b??n incr?as?d
to 54% according to ISTR-212016 which is doubl?d from pr?vious y?ar as in 2014
it was 24%.
Z?RO DAY VULN?RABILITY
Th?r? was mor? than on? million w?b attack against mass?s in
2015. Thos? Cyb?r criminals continu? with th?ir activiti?s and ?xtract full
advantag? of vuln?rabiliti?s in l?gitimat? w?bsit?s to poison us?rs b?caus? w?bsit?
administrators d?clin?d to s?cur? th?ir w?bsit?s. W? ar? at risk du? to around
75% of l?gitimat? w?bsit?s hav? unpatch?d vuln?rabiliti?s,
Discov?r?d Vuln?rabiliti?s in thr?? Quart?r of W?bsit?s
Aft?r all roll?r costar of 2015 Th? World ?xp?ri?nc?d hug?
data br?ach ?v?r in history around 191 million r?cords w?r? ?xpos?d in fact
this not accurat? figur? b?caus? mor? compani?s ar?n’t t?lling ?xact figur?s of
th?ir data br?ach according to Symant?c quantity of untold data br?ach is
around Half a billion.
Half a Billion Stol?n or Lost R?cords
H?r? ar? som? tr?nds which w?r? in N?ws in 2015.
In ISTR-2016 Symant?c d?t?rmin?d that ?xist?nc? of malwar?
has b??n incr?as?d about 430 million in 2015 almost mor? than 36% as p?r last y?ar
statistics but this n?ws isn’t shocking for us as w? ar? awar? of Attacks
against busin?ss?s and nation touching br?aking n?ws with r?gulatory that hav? b?com? th? r?ason of acc?l?ration
in cyb?r-attack. This S?curity thr?at r?port
cov?rs ?xt?nsiv? ar?a of cyb?r thr?at attack, Smartphon? thr?ats, Int?rn?t of
Things (IoT) vuln?rabiliti?s and m?dia scams furth?r it also has an obs?rvation
of attack?r’s motivations, b?haviors and tactics.