F-Secure declares 2012 'Year of the Exploit'

2012 was the "Year of the Exploit," according to F-Secure, a maker of Internet security software. That's how F-Secure described the security landscape in a report released Tuesday.

F-Secure, which focused on cyber threats during the second half of 2012, noted that the Internet has become the primary attack vector for digital desperadoes whose No. 1 weapon is the exploit kit. "Today, the most common way of getting hit by malware is by browsing the Web," F-Secure said.

What makes the Web so attractive to cyber criminals is the increasing popularity of exploit kits that automate the process of infecting computers. Of all the malware detections in the second half of 2012 identified by F-Secure, 28% were related to exploits.

[See also: Java exploit used in Red October cyberespionage attacks, researchers say]

The use of exploits continued a trend established during the first part of the year, despite the yeoman efforts of malware fighters and some successful efforts to cripple prominent botnets, F-secure said.

In 2012, botnet operators increasingly turned to marketing to expand their reach, "offering affiliate programs with attractive 'pay-per-installation' rates and 'rent-a-botnet' schemes that allow attackers to use the combined power of the infected hosts to perform attacks or other nefarious activities," F-Secure said.

The report also noted that Apple's OS X is getting more attention from malware writers. In 2011, for example, only 59 unique malware families were found on the Mac platform. A year later, the number of unique malware variants F-Secure found had more than doubled to 121.

According to F-Secure, Java was a frequent target of exploits in 2012. "If Oracle tightened Java security, it could definitely slow the growth curve in exploit activity," F-Secure Labs researcher Sean Sullivan said in an interview.

"Because the Java plug-in for browsers is being beaten up so badly, and it's installed so widely, Oracle is going to have to do something different about how it manages the security and updates of Java," Sullivan said.

Two additional trends likely to emerge this year will be the development of more botnets controlled by peer-to-peer (P2P) communications and the creation of botnets using mobile devices, according to Jon Ramsey, CTO of Dell Secureworks, a provider of information security services.

P2P is gaining favor among bot masters because it makes it impossible to take down a botnet by disrupting a single server. "We continue to see botnet communication evolve aggressively so that the botnets can maintain their resiliency to either being taken down by law enforcement or stolen by other criminals," Ramsey said.

He said mobile devices, especially smartphones, are becoming juicy targets for bot masters. "What's appealing about a mobile device for a botnet operator is they're always on and always connected," Ramsey said.

F-Secure also delivered a jab at the use of passwords, saying they are increasingly less valuable in the security fight. "The password is dead and we all know it," F-Secure said. "But unfortunately, its successor has yet to turn up."

Read more about data protection in CSOonline's Data Protection section.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

Tags botnetssoftwaredata protectionapplicationsf-secureexploitsExploits / vulnerabilities

More about AppleDellDell SecureworksF-SecureOracle

Show Comments

Featured Whitepapers

Editor's Recommendations

Brand Page

Stories by John P. Mello Jr.

Latest Videos

More videos

Blog Posts