By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Versatile Threats: Dangers for any Device – Kaspersky Daily
    1 year ago
    Kaspersky Internet Security for Android wins independent anti-virus testing
    1 year ago
    DEF CON 23: Tell me who you are and I will tell you your lock screen pattern
    1 year ago
    Latest News
    Patchstack Alliance Bounty Program Events for December
    1 day ago
    Your Smart Coffee Maker is Brewing Up Trouble
    2 days ago
    Earn up to $10,000 for Vulnerabilities in WordPress Software
    2 days ago
    Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
    2 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Cloudflare Introduces User Friendly CAPTCHA Alternative Called Turnstile
    1 year ago
    Windows 10 build 19044.1947 (KB5016688) outs as preview
    1 year ago
    How to disable WiFi or Ethernet network adapter on Windows 11
    1 year ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    10 months ago
    Now you can speed up any video in your browser
    10 months ago
    How to restore access to a file after EFS or view it on another computer?
    10 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    11 months ago
  • How To
    How ToShow More
    How to stop, disable, and remove any Android apps — even system ones
    17 hours ago
    Bigger, Better, Cooler in a 2U1N form factor
    Bigger, Better, Cooler in a 2U1N form factor
    2 days ago
    Vulnerability in crypto wallets created online in the early 2010s
    3 days ago
    Use Windows 11 features to inspire creativity, speed up everyday tasks
    4 days ago
    Windows brings nostalgia to the holidays with the return of Windows Ugly Sweaters, this year featuring the Bliss backdrop
    5 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to share notes with other users on iPhone?
    1 year ago
    QR code creation service
    1 year ago
    How to copy a link to a specific part of an article in Chrome?
    1 year ago
    Latest News
    Change screen brightness on Windows 11
    2 days ago
    How to share Microsoft 365 Family subscription with other people
    4 days ago
    How to enable random MAC address for Wi-Fi on Windows 10
    4 days ago
    How to join Office apps to Microsoft 365 Insider Program
    4 days ago
  • Glossary
  • My Bookmarks
Reading: The unconventional list of top security events in 2015
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Wordpress Threats

The unconventional list of top security events in 2015

Vitus White
Last updated: 11 October
Vitus White 9 years ago
Share
11 Min Read

There were many security stories in 2015. Narrowing down the list to 10 is quite a daunting task. However in order to stay neutral I decided to chose 10 most popular stories on Threatpost. Surely anyone in the IT or security space will have their own top 10, but I tried my best to be unbiased – it’s not me who chose the stories but the readers. Still if you disagree or feel that I have missed a story or two, please drop a note in the comments below. So now without further adieu, here is the list of Top 10 security stories in 2015.

Contents
End-user threatsAttacks on IoT, home routers and industrial networking appliances EncryptionSerious vulnerabilities & serious attacksRoutine vulnerabilities in commodity software

Kaspersky Lab cybersecurity #predictions for 2016 – https://t.co/1JFA8qRBm9 #KL2016Prediction #infosec #netsec pic.twitter.com/LjGxVMG7xV

— Kaspersky Lab (@kaspersky) December 9, 2015

This year’s list will be broken into five key categories:

  • Low-profile end-user threats;
  • ‘Least expected’ vulnerabilities: IoT, home appliances and industrial networking applicances security;
  • Encryption issues;
  • Well-publicized vulnerabilities in major platforms and high-end cyberthreats, and examples of most advanced attacks;
  • Routine yet dangerous bugs in commodity software.

Let’s get started!

End-user threats

#10 A Trojan in Facebook, spotted back in January (story). Over 110,000 Facebook users infected their devices with this Trojan by clicking on a malicious link on the social network! No way!

The unconventional list of top security events in 2015

Unfortunately for the majority of users on the Internet, they are often collateral damage when it comes to the cyberwar between cybercriminals and the good guys. For example, a Trojan masking as an Adobe Flash update and installing a keylogger on the victim’s machine. We constantly track these types of incidents, but they rarely get shortlisted for any kind of rating, as security experts are typically not overly excited about them.

However, these ‘traditional’ security threats will continue to remain the a major pain, for both consumers and corporate users. The counter measures are pretty straightforward and obvious, the security and protection methods have long caught up with such cyberattacks. At the same time, the attacks like the one with the Facebook Trojan in January still affect tens of thousands of users, so it’s worth an effort to increase public awareness of protection methods and techniques. There’s clearly room for improvement across the board.

Attacks on IoT, home routers and industrial networking appliances

What do garage door remote controllers and Cisco’s networking software have in common? Well, they have equally loose protection.
While users and vendors see protection as vital for traditional computers and devices, they pay less attention to their connected “smart” devices. You see, what is often overlooked with the Internet of Things is that these devices are powerful computers that left unsecured, and that can lead to breaches or worse.

How will the Internet of Things affect cybersecurity? – http://t.co/fWScmf4QfQ pic.twitter.com/sAk1mcZPg5

— Kaspersky Lab (@kaspersky) April 9, 2015

When it comes to the attacks on these types of devices, there were a few stories that stood out on Threatpost. #9 Back in 2014 Check Point’s security researchers discovered a vulnerability which affected 12 million home routers (Story ).A specially crafted packet was used to expose the router’s web interface. #8 Later in June 2015, hard-coded default SSH keys were found in Cisco’s security appliances (Story). It was just one of the many cases when such bugs were found in network appliances and software.

#7 Around the same time, renowned security researcher Samy Kamkar, discovered that remote garage door controllers, quite popular in the US, also suffer from weak security (Story). It takes 30 minutes of bruteforce to crack the keys, but a series of software bugs allowed Kamkar to cut this time down to 10 seconds.

Using a Toy to Open a Fixed-Code Garage Door in 10 Seconds – http://t.co/NvNR1vhOnG

— Threatpost (@threatpost) June 4, 2015

Lest we forget serious vulnerabilities in automotive systems. This summer, following a groundbreaking research by Charlie Miller and Chris Valasek, Fiat Chrysler issued the first ever security patch for a car: The vulnerability could be used to remotely hack the vehicle management system via the multimedia dashboard, ultimately opening an opportunity to even hijack the steering system. Seriously, if there are bugs in software and computing appliances, why shouldn’t there be bugs in the car itself? Can’t help but recite a famous but now deleted Tweet:

The unconventional list of top security events in 2015

When computers are entrusted with a task, they tend to make less mistakes and bloopers that humans. But it is people who program them, and computing systems are becoming increasingly essential to perform mission-critical tasks, from managing nuclear power plants to controlling city traffic. Welcome to the brave new world!

Encryption

Well, that’s getting complex. Only a serious scientific researcher can help to assess efficiency of any encryption method. There’s a good example to prove this point: SHA-1, a popular hashing algorithm, was considered perfectly reliable some five years ago, but in 2015 it was rendered ‘theoretically vulnerable.’
The NSA has already questioned the resilience of elliptic curve encryption algorithms and is considering (or pretending to consider) encryption techniques, which would be uncrackable even for quantum computers.

Quantum computers: what does it mean for you today? https://t.co/E3Fwee3j2W #futuretech pic.twitter.com/mBSnlpoVtV

— Kaspersky Lab (@kaspersky) December 8, 2015

#6 But that’s not the only problem with encryption. Weak encryption posed a serious threat to Open Smart Grid protocol (Story). OSGP is an IoT deployment of the electrical grid, an attempt to unite all meters and management systems into a single network. That means, potential security issues would compromise the electric supply. The network complexity is the reason why the key criterium to assess encryption resilience is trust.
In 2014 TrueCrypt developers decided to shut down their project, a rather popular utility used for the on-the-fly encryption. #4Following the sequence of events, we have witnessed several independent source code audits and the emergence of inherently curious spin-offs: VeraCrypt and CipherShed (Story). Recently a backdoor in Juniper routers was discovered, and the encryption issue was also of paramount importance in that incident.

Serious vulnerabilities & serious attacks

1 Billion #Android devices vulnerable to #NEW Stagefright flaws… #nopatches https://t.co/1Wt8iqOY2b via @threatpost pic.twitter.com/LJUuODPDra

— Kaspersky Lab (@kaspersky) October 1, 2015

#5 While last year’s superstars among the vulnerabilities were, without doubt, Shellshock and Heartbleed, this year the Stagefright vulnerability (Story) in Android and #3the bug in a standard GLIBC library function in Linux (Story) took center stage.

The unconventional list of top security events in 2015

Linux bug hunter. An artistic interpretation

Each known vulnerability could be found through either ‘theoretical’ or ‘practical’ discovery. In some cases, researchers provided a proof-of-concept attack first, but at times a new bug is found only after attacks happened in-the-wild.

As far as practical attacks are concerned, two of the major campaigns discovered by Kaspersky Lab were Carbanak and The Equation. While the first impressive in terms of sustained loss ($1B, in case you were wondering), the latter is stunning because of its advanced and sophisticated toolset, including the means of restoring control over the victim’s PC by using a modified HDD firmware, as well as the duration of the campaign, measured in decades.

Routine vulnerabilities in commodity software

Adobe Flash, serves as a perfect example for this category: 14, 24 and 28January, March, June, July, September, December. The bad news is Adobe Flash is still an unbelievably vulnerable piece of software. Good news is patches (at least those of Adobe’s) are issued en masse, and a handful of bugs are fixed in one update. It does not mean the software became more secure, yet the overall trend over the year is positive: developers have started to take security very seriously.

Massive #Adobe #Flash Update Patches 79 #Vulnerabilities: https://t.co/oU8R0QSm1l pic.twitter.com/2iLqfcKWpJ

— Kaspersky Lab (@kaspersky) December 8, 2015

The software is installed on a large number of systems including Web browsers and gets a lot of attention. Browser developers are forced to both supervise their own software and protect users from threats on websites (at times their only option is to restrict certain capabilities, which happened to Flash in Chrome). #2 The participants of pwn2own hackathon in March managed to hack all the major browsers: first Firefox and IE, and then Chrome and Safari (Story).

The unconventional list of top security events in 2015

White hats after a successful hack at pwn2own

#1 Obsolete NPAPI extension blocked in Chrome (Story). NPAPI blocking, which happened in April, resulted in malfuntion of a number of plugins, from Java to Silverlight, causing many problems on the developers’ side. Phasing out legacy codes has become a key trend recently.

#Google Shuts Off NPAPI in #Chrome – https://t.co/Ii6aVP6cvu

— Threatpost (@threatpost) April 16, 2015

I doubt security issues will be less prominent in 2016. I’m sure the new methods to battle cyberthreats will eventually emerge. So we’ll definitely have lots to talk about next year. As for background reading, I recommend to check out the 2015 recap of threats by Kasperky Lab’s experts, a dedicated analysis of cyberthreats for businesses and 2016 predictions.


Source: kaspersky.com

Translate this article

TAGGED: Chrome, Encryption, Facebook, Firefox, Linux, Malware, Networking, PoC, Security, Side-channel attack, Software, Source code, Stack overflow, Targeted Attack, Threat, Threats, Vulnerabilities
Vitus White October 11, 2022 April 1, 2015
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

How to stop, disable, and remove any Android apps — even system ones
How To 17 hours ago
Patchstack Alliance Bounty Program Events for December
Patchstack Alliance Bounty Program Events for December
Wordpress Threats 2 days ago
Your Smart Coffee Maker is Brewing Up Trouble
Threats 2 days ago
Bigger, Better, Cooler in a 2U1N form factor
Bigger, Better, Cooler in a 2U1N form factor
Apps 2 days ago
Change screen brightness on Windows 11
News 2 days ago

You Might Also Like

How To

How to stop, disable, and remove any Android apps — even system ones

17 hours ago
Patchstack Alliance Bounty Program Events for December
Wordpress Threats

Patchstack Alliance Bounty Program Events for December

2 days ago
Threats

Your Smart Coffee Maker is Brewing Up Trouble

2 days ago
Bigger, Better, Cooler in a 2U1N form factor
Apps

Bigger, Better, Cooler in a 2U1N form factor

2 days ago
Show More

Related stories

Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin
BridesMaid – neuron writes toasts For those very occasions when you need to give out a powerful
The other day Yandex pleased us with the announcement of a new Midi station – an excellent reason to listen
REMIX – remixes of pictures from neural networksCreate, share and correct works
How to download Diablo IV for free and absolutely legallyBlizzard has opened a free
Rostelecom employees were forced to abandon Android and iOS in favor of Aurora.
Previous Next

10 New Stories

Earn up to $10,000 for Vulnerabilities in WordPress Software
Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
Short-URL Services May Hide Threats
Vulnerability in crypto wallets created online in the early 2010s
Wordfence Intelligence Weekly WordPress Vulnerability Report (November 20, 2023 to November 26, 2023)
Thrive Theme: Dismiss Tooltip to Privilege Escalation
Previous Next
Hot News
How to stop, disable, and remove any Android apps — even system ones
Patchstack Alliance Bounty Program Events for December
Your Smart Coffee Maker is Brewing Up Trouble
Bigger, Better, Cooler in a 2U1N form factor
Change screen brightness on Windows 11
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?