F-Secure declares 2012 'Year of the Exploit'

2012 was the "Year of the Exploit," according to F-Secure, a maker of Internet security software. That's how F-Secure described the security landscape in a report released Tuesday.

F-Secure, which focused on cyber threats during the second half of 2012, noted that the Internet has become the primary attack vector for digital desperadoes whose No. 1 weapon is the exploit kit. "Today, the most common way of getting hit by malware is by browsing the Web," F-Secure said.

What makes the Web so attractive to cyber criminals is the increasing popularity of exploit kits that automate the process of infecting computers. Of all the malware detections in the second half of 2012 identified by F-Secure, 28% were related to exploits.

[See also: Java exploit used in Red October cyberespionage attacks, researchers say]

The use of exploits continued a trend established during the first part of the year, despite the yeoman efforts of malware fighters and some successful efforts to cripple prominent botnets, F-secure said.

In 2012, botnet operators increasingly turned to marketing to expand their reach, "offering affiliate programs with attractive 'pay-per-installation' rates and 'rent-a-botnet' schemes that allow attackers to use the combined power of the infected hosts to perform attacks or other nefarious activities," F-Secure said.

The report also noted that Apple's OS X is getting more attention from malware writers. In 2011, for example, only 59 unique malware families were found on the Mac platform. A year later, the number of unique malware variants F-Secure found had more than doubled to 121.

According to F-Secure, Java was a frequent target of exploits in 2012. "If Oracle tightened Java security, it could definitely slow the growth curve in exploit activity," F-Secure Labs researcher Sean Sullivan said in an interview.

"Because the Java plug-in for browsers is being beaten up so badly, and it's installed so widely, Oracle is going to have to do something different about how it manages the security and updates of Java," Sullivan said.

Two additional trends likely to emerge this year will be the development of more botnets controlled by peer-to-peer (P2P) communications and the creation of botnets using mobile devices, according to Jon Ramsey, CTO of Dell Secureworks, a provider of information security services.

P2P is gaining favor among bot masters because it makes it impossible to take down a botnet by disrupting a single server. "We continue to see botnet communication evolve aggressively so that the botnets can maintain their resiliency to either being taken down by law enforcement or stolen by other criminals," Ramsey said.

He said mobile devices, especially smartphones, are becoming juicy targets for bot masters. "What's appealing about a mobile device for a botnet operator is they're always on and always connected," Ramsey said.

F-Secure also delivered a jab at the use of passwords, saying they are increasingly less valuable in the security fight. "The password is dead and we all know it," F-Secure said. "But unfortunately, its successor has yet to turn up."

Read more about data protection in CSOonline's Data Protection section.

Tags applicationsexploitsbotnetssecuritysoftwaref-securedata protectionExploits / vulnerabilities

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

SECURE Web Gateway

Balancing the requirement for strong network security with the need to harness collaborative web technologies is essential for business growth.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.