Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.
  • 7 December 2012 11:39

WatchGuard Reveals Top Security Predictions for 2013

Cyber Attacks Resulting in Human Death, Android Pick-Pocketing Attempts and Rise in Browser-Infecting Malware All Forecasted Next Year

WatchGuard® Technologies, a global leader in manageable business security solutions, today revealed its annual security predictions for 2013. Assembled by WatchGuard’s security research analysts, the list reveals an uptick in emerging cyber threats and an increased focus by governments to fight back through legislation. While the security industry is predicted to focus on “strike back” measures, WatchGuard predicts these actions will be ineffective and ultimately unviable for most organisations.

"2012 was an eye-opening year in cyber security as we saw the number of new and more sophisticated vulnerabilities rise, impacting individuals, businesses and governments," said WatchGuard Director of Security Strategy Corey Nachreiner, a Certified Information Systems Security Professional (CISSP). "This is a year where the security stakes reach new heights, attacks become more frequent and unfortunately more damaging as many organizations suffer attacks before taking measures to protect themselves from the bad guys."

WatchGuard's 2013 security predictions include:

A Cyber Attack Results in a Human Death

WatchGuard hopes it is wrong in this prediction. But with more computing devices embedded in cars, phones, TVs and even medical devices, digitally dealt death is not only possible, it's plausible. Security is still often an afterthought when developing innovative technical systems. Criminals, hacktivists, and even nation-states are launching increasingly targeted cyber-attacks, resulting in the destruction of physical equipment. Most recently, a researcher even showed how to wirelessly deliver an 830 volt shock to an insecure pacemaker, proving that digital attacks can have a real-world impact.

Malware Enters the Matrix through a Virtual Door

Last year was the first real-world instance of malware that sought out virtual machines (VMs) and infected them directly. Today, there is an emergence of malicious code that can recognise when it's running in a virtual system and can act accordingly. In 2013, WatchGuard predicts attackers will create even more VM-targeted malware. It will be designed to take advantage of weaknesses found in many virtual environments, while attempting to avoid virtualised automatic threat detection systems.

It’s Your Browser - Not Your System - that Malware Is After

WatchGuard anticipates a steep rise in browser-infecting malware in 2013. With increased adoption of cloud services like online banking, a great deal of personal and sensitive data passes through web browsers. Many antivirus solutions are focused on catching traditional malware which infects an operating system and aren't as effective at detecting browser-based infections. Now, a new type of malware has emerged. Sometimes called a Man-in-the-Browser (MitB) or browser zombie, it arrives as a malicious browser extension, plugin, helper object, or piece of JavaScript. It doesn't infect the whole system; instead it takes complete control of a browser and runs whenever the victim surfs the web.

Strike Back Gets a Lot of Lip Service, but Does Little Good

"Strike back," which refers to launching a counter-offensive against cyber hackers will receive a lot of attention but won't be implemented in most organisations according to WatchGuard. "Strike backs" can include filing lawsuits, launching cyber espionage campaigns, or even launching counter cyber-attacks against attackers. WatchGuard anticipates most organizations won't implement these measures given the jurisdictional challenges of digital attacks which bounce through several countries. Plus, criminals have the ability to plant "false flags" in malware, tricking victims and authorities into thinking someone else is behind the attack.

We'll Pay for Our Lack of IPv6 Expertise

Next year, WatchGuard expects to see an increase in IPv6-based attacks and IPv6 attack tools. While the IT industry continues to be slow at adopting IPv6 into their networks, most new devices ship IPv6-aware and can create IPv6 networks on their own. Many IT professionals don't have a deep understanding of IPv6's technicalities, yet they have IPv6 traffic and devices on their networks. This also means most administrators haven't implemented any IPv6 security controls, opening the door to attackers looking to exploit unprotected weaknesses.

Android Pick Pockets Try to Empty Mobile Wallets

Based on the following three factors, WatchGuard expects to see at least one vulnerability, even if just a proof-of-concept, that allows attackers to steal money from Android devices.

Mobile malware is skyrocketing

Cyber criminals are targeting Android devices more than any other because of the platform's openness. People are increasingly using mobile devices for online payments. Plus, many vendors, including Google, are starting to launch Mobile Wallets, which attaches credit cards to mobile devices.

An Exploit Sold on the "Vulnerability Market" Becomes the Next APT

WatchGuard expects that at least one auctioned-off zero day exploit will emerge as a major targeted attack this year. Vulnerability markets or auctions are a new trend in information security, allowing so-called "security" companies to sell zero day software vulnerabilities to the highest bidder. While they claim to "vet" their customers and only sell to NATO governments and legitimate companies, there are few safeguards in place to prevent nefarious entities to take advantage.

Important Cyber Security-Related Legislation Finally Becomes Law

In 2013, expect the U.S. government to pass at least one new cyber security act, which will likely impact private organisations. The U.S. government has been trying to pass cyber security bills that give the president and various government agencies some control over what happens in the event of cyber-attack on U.S. infrastructure. The government also wants more cooperation among private infrastructure organisations and U.S. intelligence agencies. Many are pressing for the government to enact more detailed cyber crimes laws, which may help prosecute digital crimes. On top of that, some organisations are lobbying for tougher digital IP enforcement, which privacy advocates often oppose. While 2012 proved to be a difficult year for passing new cyber legislation, WatchGuard expects this year to be different.

About WatchGuard Technologies, Inc.

Since 1996, WatchGuard® Technologies, Inc. has been a global leader of business security solutions that solve real world security problems. WatchGuard provides easy-to-use but enterprise-powerful protection to hundreds of thousands of businesses worldwide. The WatchGuard family of threat management devices provides network, application and data protection, with unparalleled levels of manageability, usability, and visibility. WatchGuard products are backed by WatchGuard LiveSecurity® Service, an innovative support program. WatchGuard is headquartered in Seattle, Wash. with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit www.watchguard.com.

Submit a media release
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Endpoint Management Solutions

Endpoint Security Management

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.