p1835ebbj4l371m8e1dk21pplukb8.jpg
Many red opened locks around one closed blue lock
Maksim Kabakou/Getty Images/iStockphoto
With news of “cyberesponiage” making headlines, enterprises are taking a closer look at the threats that can impact their business and ultimately their bottom line. McAfee Labs has analyzed the threats of the past quarter for emerging trends, which center on mobile and overall malware. With BYOD becoming ubiquitous, threats that once considered consumer problems are now becoming issues for the enterprise as well. Here are the top six threats to enterprise security.
p1835ebbj41e9psq57hs16061ar57.jpg
Wooden horse of Troje to hide people

Targeted Trojans

Attackers use legitimate apps as cover for their malicious code. In the case of “KaoSpy,” attackers used modified versions of the Kakao talk app and targeting Tibetan activists; this malware is distributed using phishing emails. The malicious spyware collects a large amount of sensitive user information (contacts, call logs, SMS messages, installed applications, and location) and uploads the data to the attacker’s server. But not all Trojans are so narrowly targeted; “BadNews” pretended to be a legitimate game app, which in turn collected sensitive user information and sent it to the attacker. As far as BYOD goes, if employees have access to sensitive information, this can be disastrous to an organization.
p1835ebbj4c7n1qokduls7g11o7b.jpg

Mobile Spyware

Mobile spyware, which forwards SMS messages, call logs and location information to the attacker’s server, has seen a small increase from the previous quarter. For instance, the Android virus “Vzw.A downloads a spyware app from the attacker’s website. Pretending to be a legitimate font installer app, the downloaded spyware forwards SMS messages, call logs and location information to the attacker’s server.
p1835ebbj3tip14h1dc01sia1ioi5.jpg
Spy Deal
Zoonar RF/Getty Images/Zoonar RF

Ransomware

An increasing problem in the last couple quarters, ransomware holds a computer hostage until the victim pays to free it. Samples of ransomware this quarter were over 320,000, more than double as many as last quarter. One reason for its exponential growth is that an ecosystem is already in place to help with services such as pay-per-install on computers that are infected by other malware, such as Citadel, and easy-to-use crime packs are available in underground market.
p1835ebbj411sm7ta7oo1huo7779.jpg
Phishing
Alex/Getty Images/iStockphoto

Phishing

After peaking during the fourth quarter of 2012, the number of new phishing URLs dropped sharply last quarter, with a modest decrease this quarter. Some of the most heavily targeted companies include Deloitte, Wells Fargo, American Express and JPMorgan Chase.
p1835ebbj377n1p7t1ife1kp7b7b6.jpg
Hacker downloading information off a computer
Andrey Popov/Getty Images/iStockphoto

Database Breaches

Database breaches have been dominated by vulnerabilities in MySQL, comprising almost 60 percent of all vulnerabilities discovered during 2013. Although database breaches overall have been on the decline since the fourth quarter of 2012, MacAfee says that it’s too early to deem this a long-term trend.
p1835ebbj41p8m2tu795fpvspaa.jpg
Magnifying glass focusing on the word Virus on a screen full of alphanumerics
Jonathan Lim Yong Hian

Browser-Based Threats

Browser-based threats, including hidden iframes and malicious Java code, comprise almost three-fourths of the Internet’s malicious activity. Remote procedure call and SQL-injection attacks, which poison legitimate websites, are the next biggest threats.