Cyberthreat Forecasts for 2010: More Complex with New Targets
Russian security experts Kaspersky ventures a forecast for malware development in 2010 and sees new types of attacks coming our way.
Cyberterrorists will be seeking filesharing opportunities in the coming year, such as peer-to-peer networks, for victimization, according to Kaspersky Lab. First indications have already emerged during 2009: working over Torrent portals, malware such as TDSS and Virut, and in its premiere, the first backdoor Trojan horse for Mac OS X, have already wreaked havoc.
Meanwhile criminals known as botnet providers are busily competing over turf. The Kaspersky report indicates, "Cybercriminals will continue to compete for traffic. The modern cybercriminal world is making more and more of an effort to legalize itself and there are lots of ways to earn money online using the huge amount of traffic that can be generated by botnets."
If the forecasts materialize, the contrary trend has nevertheless been that the number of fake antivirus programs foisted on users are falling off. In 2009 the phenomenon reached its highpoint with the Kido/Conficker worm, where its huge installation base saturated the market, while causing a shakeup of security providers with law enforcement authorities. The trick to the rogue antivirus programs was in their "discovery" of an alleged vulnerability on the PC, thereby eliciting user panic and recourse to an anti-malware program for a price that proceeded to install just more malware and reduce the computer to a bot.
What should be expected alongside are more complex malware and sophisticated rootkit technologies, says Alex Gostev, director of Kaspersky Lab's Global Research & Analysis Team.
Much of the upcoming focus for budding cybercriminals might end up being Google's Wave web service. Kaspersky sees atacks on the Google service in the usual three phases: sending spams, starting phishing attacks and spreading malware by exploiting vulnerabilities. However, the equally new Chrome web service is not expected to attract much attention among cybercriminals, at least not in the near term.
2010 might be a different story for the iPhone and Android mobile phones. The first malware for these devices appearing in 2009 supports the fact that these mobile systems are certainly in the malware industry cross hairs, predicts Kaspersky. One definite point of entry is unsecured third party software. The strategy supports Kasperky's credo that cybercriminals are professionals undertaking their own form of market analysis: Android devices are gaining popularity in China. Further Kaspersky analyses are available on its website.
Version 16 of the popular Linux desktop reveals new tools, edge-snapping, and performance improvements.
Symantec says Linux-Darlioz burrows in through PHP.
Dell renews its quest for the ultimate developer machine.
Innovative back door looks like normal SSH traffic.
One of CeBITs most successful forums opens the new year with a new name. The popular Open Source Forum continues in 2014 under the name Special Conference: Open Source. This year, the forum will be bigger and offer a wider range of possibilities for sponsors.
New release offers better graphics drivers and expands filesystem support.
New mail protocol will shut out the NSA and prevent snooping on metadata.
A new web application helps users visualize distributed denial-of-service attacks.
Ubuntu 13.10 takes a step toward convergence, with lots of mobility, but Mir only partly here.
Galileo board is targeted to embedded developers and educational institutions.