10 Major Security Threats 2014
Total Page:16
File Type:pdf, Size:1020Kb
2014 Edition 10 Major Security Threats ~ Information Security Is Getting Increasingly Complex… Which Threats Are YOU Facing? ~ IT SECURITY CENTER (ISEC) INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN March 2014 This document is available for download at the following URL: 10 Major Security Threats 2014: ~ Information Security Is Getting Increasingly Complex… Which Threats Are YOU Facing? ~ http://www.ipa.go.jp/security/english/vuln/10threats2014_en.html Contents INTRODUCTION ....................................................................................................................................................... 2 CHAPTER 1. THREAT CATEGORY AND TREND ..................................................................................................... 4 1.1. Cyber Domain Issues ........................................................................................................................... 5 1.2. Cyber Crime Through Virus and Hacking ............................................................................................. 6 1.3. Internet-Based Scam and Crime .......................................................................................................... 7 1.4. Internal Control and Security Management .......................................................................................... 8 1.5. Net Morality ........................................................................................................................................... 9 CHAPTER 2. 10 MAJOR SECURITY THREATS 2014 .............................................................................................. 11 1st Espionage Operations through Targeted Attack .................................................................................... 12 2nd Unauthorized Login and Use of Services ............................................................................................. 14 3rd Website Hacking ................................................................................................................................... 16 4th Leakage of User Information from Web Services ................................................................................. 18 5th Unauthorized Online Banking Transfer ................................................................................................. 20 6th Malicious Smartphone Applications ....................................................................................................... 22 7th Careless SNS Posting ........................................................................................................................... 24 8th Information Leakage through Loss of Devices and Misconfiguration of Settings ................................. 26 9th Fraud/Extortion with Virus Attacks ......................................................................................................... 28 10th Denial of Service .................................................................................................................................... 30 Other Candidates for 10 Major Security Threats ........................................................................................... 32 CHAPTER 3. EMERGING THREATS AND CONCERNS ............................................................................................. 35 3.1. Growing Networked Devices .............................................................................................................. 36 3.2. Importance of End Point Security ....................................................................................................... 38 3.3. Internet Use among Increasingly Younger Ages ................................................................................ 40 APPENDIX: MAJOR SECURITY INCIDENTS AND NEWS IN 2013 .............................................................................. 42 Introduction This report ranks and explains the security threats observed through the security incidents, cyber attacks and changes in IT environment during the year 2013 selected by the vote of the 10 Major Security Threats Committee which consists of 117 information security experts. The ranks change every year depending on various factors and those factors are getting increasingly complex year by year. Changes in Threats The table on the next page shows the changes in the things like attack trend, IT environment and government policies from 2001 to 2013. Compared to 2001, it is apparent that threat factors IT defenders should watch out have increased in numbers and complexity. Following the changes in threats, new laws and policies have been enforced, and issues like national security and cybercrime investigation have begun to be recognized as new problem domains. As just mentioned, today’s “information security” has gone beyond the traditional matters such as virus, unauthorized access or security management, and new issues have begun to be defined from different angles in different fields and domains. Trends in 2013 Overall, it can be said that 2013 was a year where problems in multiple fields and domains have become evident. One is that cyber attacks and crimes represented by targeted attacks have grown. Threats imposed by cyber attacks are also relatively growing, such as mega-leak of personal information, increasing website hacking and record-breaking large distributed denial of service (DDoS) traffic volume. Meanwhile, a number of inappropriate publications to social media like Facebook and Twitter have caused eruptions of criticism on the Internet. In these cases, not only individuals (publishers) but also their employers were accused of lack of supervision, which taught us that morality of individual Internet users can be a critical issue. Especially, the number of cases where minors are taken into custody or arrested is increasing, and criminal acts among increasingly younger ages are becoming a major social problem. Future Challenges One of the changes in IT environment is an increase of Internet-connected devices, such as office equipment and smart home devices. With that, unauthorized access to and information leak from those devices due to improper settings have emerged. Protecting PCs and servers is not enough anymore. What we need to protect is now expanding to office equipment and smart home devices. We are at the time to rethink the fundamentals of security. As we see, IT environment is evolving in various ways and generating new problems. What is important is that one assesses whether the threats impose a risk on one’s organization, understands problems and challenges, and takes appropriate 2 countermeasures. We hope you read this report and use the threats addressed here to assess risks those threats may affect you and your organization. Table 1: Changes in Threats Golden Age for Internal Control / Compliance Globalization of Threats Network Virus Fever 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 ★Windows XP Released ★iPhone Released ★iPad Released Cloud Computing / Mobile Devices IT Broadband Network Public Wireless LAN Environment Social Media Services Targeted Attack Combined Attack Worm/ Network Virus Phishing Fraud Attacking Methods Botnet Mobile Attack Intelligence Stealing / Destruction Attackers Pecuniary Gain / Industrial Spying Crime for Fun Hactivism ・Nimda ・SQL Slammar ・DDoS Attack on U.S. & South Korea ・CodeRed ・MS Blaster ・Stuxnet Attack on Iran Incidents/ ・ Data Leak through P2P Software ・Attacks on Government Agencies Events ・Data Leak through Spyware ・Attacks on Financial Institutions ・NSA Suveillance Revealed ・Act on Prohibition of Unauthorized Computer Access Cyber Crime Crackdown ・Act on Electronic Signatures and Management System ・Unfair Competition Prevention Act Revised Certification Business ・Act on the Protection of ・Penal Code Revised Personal Information ・Act on Prohibition of ・Electronic Documents Act Unauthorized Computer Access Revised Laws/ ・ISO/IEC 27001 Published Policies ・Common Standards of Foreign Affairs / Information Security National Security Measures for Government Agencies Published ・National Strategy for Secure Cyberspace (U.S.) ・Public-Private Collaboration Launched ・U.S.-Japan Cooperation for Cyber Attack Response ・National Security Strategy Announced 3 Chapter 1. Threat Category and Trend Recently, terms like “cyber attack”, “cyberspace” and “cyber domain” have been often heard and many readers may feel confused about their relationship with traditional “information security”. The thing is, as seen from prevalence of internet services, changes in people’s life style such as wide used of social networking services (SNS) and smartphones, or international discussion on state-sponsored cyber attacks, challenges and environment surrounding information security are complexly evolving. If one focuses on just an attack, the overall picture of the attack or relationship between traditional information security and cyber issues, which have diversified into international politics, foreign affairs and national security and military sphere, will look very complex and be difficult to understand, making it harder to see and sort out the real problems. The word “cyber attack” could mean different things depending on individuals and organizations that use the word. It is important that one responds to threats based on the assessment - that which threats have impact on one and one’s organization in what way. Threats will not affect all individuals and organizations equally. Their impact changes depending on