2011 Security Trends: Bad Times with Refined Phishing and Mobile Apps

Cyber security will be no easier in the new year than it is now, as malware proprietors get more sophisticated in their phishing attempts, malware-as-a-service becomes the norm, and smart phones and tablets draw increased attention from cyber criminals. That's the prediction of security software vendor M86 Security, which has released a report summarizing its threat predictions for 2011.

Security experts at the company said they expect spam campaigns to increasingly mimic legitimate mail from popular Web sites. Gone will be the obvious misspellings, double exclamation points, textual spacing gaffes, and other tiny clues signaling that a message has come from a spammer instead of a legitimate mailer. Examples cited in the report include e-mail that perfectly mimics communications from Amazon, FedEx, and LinkedIn, luring users to click on a link, thereby downloading malware or delivering a malicious payload. "We observed that the headers and body templates were taken from actual LinkedIn messages," the report's authors wrote. "Therefore, it's nearly impossible for the average user to distinguish between the legitimate LinkedIn messages and the nefarious ones."

The growth of the Smartphone and tablet markets is making those devices increasingly attractive to cyber bad guys, reported M86. Although both Apple and Google have a restrictive approval process for applications placed in their respective stores, both companies have begun to see more vulnerabilities in their platforms. For example, in October 2010 a group of researchers tested Android apps specifically and found that private information was being delivered without their users' knowledge. "So far, Android has seen rogue applications such as a 'Movie Player,' which secretly sends SMS messages to a premium rate number, costing the end user several dollars per message," M86 stated. "Other applications have harvested information such as a user's SIM card number and voicemail password, sending it to a server in another country."

Although mobile malware has focused on smart phones, the report's authors expect to see more illegal activity targeted to tablets in the coming year. For both types of devices, organizations may face "more pains" as users gain broader access to the wireless network. To counter potential ill effects, the company advised IT professionals to set "clearly defined policies and [put] remediation in place for usage of these devices on the corporate network."

A third trend for 2011 is the increasing use of online services that provide a one-stop-shop for malware tools. According to M86 research findings, cyber criminals are teaming up to offer their products as services alongside traditional applications. With the Neosploit kit, for example, "customers can purchase a specific Web server configuration that redirects victims' requests to a Neosploit back-end server, which is apparently handled by the NeoSploit team," the report stated.

Social networks will also grow as a target in the coming year, as will stolen digital certificates. According to Bradley Anstis, vice president of technical strategy at M86, "To outsmart the bad guys, organizations need to first understand where the threats are likely to come from, and then second define exactly what needs to be protected, and how critical it is. But just as important, they must lay out their best practice strategies and policies for proactively combating and staying ahead of the emerging security threats."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • mathematical formulas

    McGraw Hill Launches AI-Powered ALEKS for Calculus

    McGraw Hill has added ALEKS for Calculus to its lineup of ALEKS digital learning products, bringing AI-powered personalized learning support to the calculus classroom.

  • laptop displaying a phishing email icon inside a browser window on the screen

    ED Grant Portal Target of Phishing Campaign

    Threat researchers at BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal.

  • red brick school building with a large yellow "AI" sign above its main entrance

    New National Academy for AI Instruction to Provide Free AI Training for Educators

    In an effort to "transform how artificial intelligence is taught and integrated into classrooms across the United States," the American Federation of Teachers (AFT), in partnership with Microsoft, OpenAI, Anthropic, and the United Federation of Teachers, is launching the National Academy for AI Instruction, a $23 million initiative that will provide access to free AI training and curriculum for all AFT members, beginning with K-12 educators.

  • young educators collaborate with AI tools on laptops and tablets

    Survey: Younger Educators More Likely to Embrace AI Tools

    While educators across the United States agree that AI has enhanced classroom engagement, enthusiasm for AI's benefits is strongest among young teachers, according to a recent survey from learning technology company D2L.