Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    CA Predicts More Attacks on Experienced Users

    Written by

    Matt Hines
    Published January 25, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The continued rise of IT threats that seek to trick even the most careful, experienced PC users ranks among the top issues highlighted by software maker CA in its latest online security research report.

      Published on Jan. 25, the CA 2007 Internet Threat Outlook highlights the most pressing online security trends projected to have an impact over the next 12 months by researchers at the IT systems management and authentication applications provider.

      According to the CA Security Advisor Team, malware writers will continue to blend multiple threat formats and utilize new, covert distribution methods in 2007, making it harder for even the most informed users to discern the difference between legitimate content and attacks.

      /zimages/5/28571.gifCA rolls out support for Windows Vista. Click here to read more.

      CA, based in Islandia, N.Y., said malware brokers will continue to piece together threats such as Trojan horse viruses, worms and the many forms of spyware to hide their attacks and evade technological defenses employed by both enterprises and consumers. With the level of professionalism rising quickly among the most sophisticated virus distributors, CA predicts that zero-day exploits, drive-by malware downloads and extremely intricate phishing schemes will continue to become more dangerous and harder to detect.

      Of particular danger to PC users will be blended threats that combine different elements of the various attack models, such as spam-borne Trojans and cross-site scripting code loaded onto legitimate Web sites, which go to greater lengths to cloak their activity on PCs and circumvent anti-virus systems.

      According to the CA report, Trojan viruses—which load small, hard-to-find programs onto PCs and then call out to external sources to pull additional malware threats onto the infected device—accounted for 62 percent of all malware in 2006, while worms—which specialize in propagating themselves from one machine to another—represented 24 percent of attacks.

      In a prelude to the types of threats CA expects to encounter over the next year, 2006 also marked the first time that researchers tracked a spyware program that used a so-called zero-day exploit to take advantage of vulnerabilities previously unidentified by software vendors or security researchers. The term “zero day” comes from the idea that users are unable to prepare for attacks on such vulnerabilities before they arrive, unlike in the case of malware that takes aim at known product flaws.

      The research report contends that phishers—proprietors of fraudulent Web sites designed to look like legitimate URLs—will also become more sophisticated in 2007.

      Phishers will replace the spam e-mails advertising Viagra or mimicking online banking communications that they have traditionally used to trick people into visiting their sites with new social engineering ploys, fooling new legions of consumers into swallowing the bait, CA said. For example, phishers may use messages that mirror common administrative e-mails such as e-mail delivery failure notices.

      After slowing slightly during 2005, spam volume increased more rapidly again in 2006, powered largely by botnets, the networks of compromised PCs used to send spam through an ever-shifting list of IP addresses. CA predicts that along with continued adoption of botnets to distribute spam, attackers will also continue to use image spam—which hides the content of the e-mails in graphics files to evade filtering applications—and to load more of their messages with Trojan programs.

      Attacks targeted at specific companies or individuals are also expected to increase next year, according to the report, as criminals look for new ways to aim their threats at potentially lucrative subjects. From keystroke-logging programs, which spy on users Web travels and attempt to steal passwords and other protected data, to one-off insider threats crafted by privileged users who know best how to exploit corporate security loopholes at their own companies, such targeted threats are expected to continue to proliferate.

      Another type of targeted threat expected to grow in popularity is ransomware, through which attackers seek to take over or encrypt important files and then demand payment from the contents owners to release the information. In addition to using more complex methods of obscuring the data involved in such attacks, criminals have found new ways to collect their payments while staying out of view of law enforcement officials, CA researchers said.

      Kernel rootkits, which cloak their activity by replacing a portion of a programs software kernel with modified code, are also expected to continue to be big in 2007. While rootkit-fighting technologies such as the PatchGuard kernel protection system built into 64-bit versions of Microsofts new Windows Vista operating system are arriving, most PC users will still be left open to the attacks over the next twelve months, CA said.

      /zimages/5/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      Researchers are predicting that malware threats that take advantage of vulnerabilities in popular applications will continue to dominate the enterprise security landscape. As users are increasingly adopting tools for stopping traditional viruses such as those delivered via e-mail, hackers will continue to aim their efforts at finding and exploiting application-level flaws, the report said.

      Finally, CA said hackers will continue to ramp up efforts to poison search engine rankings and to perpetrate click-fraud on advertising networks. By creating malware-laden sites that appear near the top of search results, including pages that mimic legitimate sites and URLs that are typos of popular Web destinations, CA said, attackers will continue to successfully target both experienced and new Web surfers.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Ryan Naraines eWEEK Security Watch blog.

      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.