Every web user in the world, whether personal or professional, can fall victim to cybercriminals. Two types of cyber-attack were particularly noticeable during the second quarter of 2013: the declination of the Fort Disco malware and the Mevade botnet.
A variation on the Fort Disco malware
The Fort Disco malware was discovered when it attacked content management systems. Its existence was reported by a company providing security solutions against DDoS attacks. According to the company, the malware affected more than 25,000 Windows-based computers. The hackers also used it to gain access to over 6,000 content management systems, illicitly acquiring usernames and passwords.
A researcher has uncovered a variant of the Fort Disco malware that attacks FTP and POP3 e-mail servers. By attacking the latter, cybercriminals intend to broaden the scope of their misdeeds.
The Mevade botnet
Originating in Russia, the Mevade botnet was used by cybercriminals to carry out a campaign of cyber-attacks last July. Several sectors were affected, including services, transport, healthcare, industry and communications. Users in the United States were particularly hard hit, but not those in South America and Europe. Russia, for its part, has not been concerned by the Mevade botnet.
According to security software publishers, the Mevade botnet caused a traffic overload that saturated Tor in August. According to experts, its migration to this system is intended to hide control of the botnet. Cyber-criminals use it to carry out malicious activities such as data theft and fraud. They don’t hesitate to use reverse proxies to unearth sensitive information.
For those in the know, the Mevade botnet is used to direct classic cyber-attack campaigns. It is less harmful than threats such as Flame, Duqu or Suxtnet. In fact, the network controlling these zombie PCs simply collects computer data with the aim of selling it to the highest bidder.
Safety: essential for cell phones
For the time being, mobile terminals are still relatively unaffected by malware, but by 2015, antivirus will account for around 30% of the market. This explosion will come from the growing use of personal mobile devices in the workplace. This is the practice of BYOD (‘Bring Your Own Device’), which involves using personal equipment such as telephones in the workplace. For IT security vendors, the aim is to develop a solution that protects users’ personal and professional information.
As a reminder, Altospam Oktey’s mobile customers who use their smartphones or tablets to read their e-mails are protected just as effectively as those who log on from their PCs, thanks in particular to the 4 anti-virus features built into the solution.
For the time being, mobile device owners are still put off by the fees charged by security software publishers. They will therefore need to review their pricing, choose their targets carefully and better understand demand in order to keep up with the trend. In the future, the massive arrival of offers on the mobile device security market will surely benefit users.