ENISA Interim report analyses Top Cyber Threats

Some key trends identified in the study are:

  • Cyber-criminals increasingly using advanced methods to implement attack techniques (vectors) that are non-traceable and difficult to take down. Anonymisation technologies and peer-to peer systems (so called distributed technologies) play an important role in this.  It is clear that mobile technology is increasingly exploited by cyber-criminals. Threats of all kinds that were encountered in the more traditional arena of IT will affect mobile devices and the services available on these platforms.
  • The wide spread of mobile devices leads to an amplification of abuse based on knowledge/attack methods targeting social media.
  • The availability of malware and cyber-hacking tools and services, together with digital currencies (e.g. Bitcoins) and anonymous payment services is opening up new avenues for cyber-fraud and criminal activity.
  • There is a real possibility of large impact events when attacks combining various threats are successfully launched.
  • As reported by ENISA in its report on major cyber attacks (2013/07/20), cyber-attack is the sixth most important cause of outages in telecommunication infrastructures, and it impacts upon a considerable number of users. Taking into account these incidents, and denial of service threat developments, we observe an increase in infrastructure threats in 2013.

 The study identifies the following top threats with major impact since 2012.

Drive-by-exploits: browser-based attacks still remain the most reported threats, and Java remains the most exploited software for this kind of threat.

Code Injection: attacks are notably popular against web site Content Management Systems (CMSs). Due to their wide use, popular CMSs constitute a considerable attack surface that has drawn the attention of cyber-criminals. Cloud service provider networks are increasingly used to host tools for automated attacks.

Botnets, Denial of Services, Rogueware/Scareware, Targeted Attack, Identity Theft and Search Engine Poisoning are the other trending threats.

A full ENISA Threat Landscape 2013 report is due by the end of the year.

The Executive Director of ENISA, Professor Udo Helmbrecht commented: “This short, interim report informs security stakeholders as early as possible about developments in cyber threats, so that they are able to take countermeasures”.

For full report ENISA Threat Landscape mid year 2013

www.enisa.europa.eu

 

Ähnliche Artikel

Der E-Commerce-Umsatz der Top-100-Onlineshops in Deutschland konnte auch im Jahr 2018 ein zweistelliges Umsatzwachstum erzielen und schafft eine Steigerung von 10,2 Prozent auf 33,6 Milliarden Euro. Dies geht aus…

Bluecode kooperiert jetzt mit cashpresso, um Mobile Payment in Österreich und Deutschland weiter zu etablieren. Nutzer von cashpresso können dadurch jetzt mit ihrem Smartphone am POS bezahlen. Der Bezahlvorgang…

Rund ein Jahr nach Einführung der digitalen girocard in Deutschland verzeichnet die Deutsche Kreditwirtschaft stetig wachsendes Interesse an Mobile Payment. Die Sparkassen waren Ende Juli und die Volksbanken Mitte…

Kommentar oder kurze Frage loswerden?

Kein problem!

  • Dieses Feld dient zur Validierung und sollte nicht verändert werden.