View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Cyberattacks old and new return with vengeance, says Trend Micro

Cybercrooks update the classics whilst experimenting with modern tactics.

By Jimmy Nicholls

Hackers are using a mixture of old and new cyberattacks to target businesses as attackers update and expand the range of techniques available to themselves, according to the security vendor Trend Micro.

A study of the first quarter of this year showed zero-day attacks, malicious advertising and macro malware being used by attackers as part of a broad set of tactics.

Data from the firm also showed that old attack styles were updated to make them more potent, with ransomware capable of locking up victims’ systems being redeveloped with stronger cryptographic functions despite its decline in use last year.

Raimund Genes, CTO at Trend Micro said: "Even though we are early in the year, it is clear 2015 is shaping up to be noteworthy in terms of volume, ingenuity and sophistication of attacks.

"It is clear businesses and individuals alike need to be proactive in protecting against threats."

Among the oldest bugs the firm found being exploited was Freak, a decade-old weakness in the SSL/TLS security layer that was based partly on US regulations around cryptographic exports.

Trend Micro also found point-of-sales systems such as those hit in the attacks on US retailers Target and Home depot are increasingly being targeted, with healthcare similarly affected.

Content from our partners
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline

Newer tactics from hackers this year include the use of exploit kits – software designed to automatically abuse bugs and vulnerabilities.

"The question we have to ask is, ‘are we doing enough to protect ourselves from security threats?’" Genes said.

"While we need to constantly update our systems to protect against new attacks, the first quarter of 2015 clearly showed we need to also watch out for older threats, and how no industry or system should feel exempt."

 

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU