Hackers target government security more than other industries


By GovTechReview Staff
Thursday, 13 March, 2014


Federal government agencies were targeted by the highest number of unique malware families during 2013, research from security vendor FireEye has found.

The company's FireEye Advanced Threat Report: 2013 analysed over 39,000 unique cyber security incidents monitored during the year, and found almost 18,000 unique malware infections due to advanced persistent threats (APTs) that had snuck through organisations' defences to plant malware on their client devices.

Federal government bodies were targeted by 84 of the 159 malware families documented by FireEye during the year.

State and local government bodies (52 families) were also frequently targeted, ranking eighth on a list in which services and consulting (81), technology (80), financial services (79), telecommunications (65), education (61), and aerospace and defence (58) rounded out the top eight.

'Watering hole' attacks, which strike visitors to popular Web destinations based on hackers' knowledge of the type of victim they are trying to hit, were used particularly frequently by APTs targeting US government Web sites.

The research also showed that attackers were regularly finding “creative ways” to detect and work around the limitations of virtual malware 'sandboxes', which are increasingly being used to try to manage and isolate malware's behaviour.

“Sandboxes make an attacker's job more difficult (and therefore more expensive) by requiring at least two exploits,” the report says. “One is to obtain code execution, and another to bypass the sandbox....Even given these increased challenges, it is clear that attackers still find a sufficient return on investment to devote the time, energy, and resources required to bypass sandboxes altogether.”

FireEye also tracked zero-day campaigns run during 2013, with Internet Explorer (IE) targeted by 37 percent of attacks and Java (23 percent), Flash (23 percent) and Adobe Acrobat Reader (15 percent) making up the rest.

The high proportion of IE-related attacks was enough to make IE “the single most dangerous zero-day attack vector in 2013,” FireEye reported, noting that the proliferation of old versions of IE – for example, v7 and v8 widely used in established environments – “could be due to the security enhancements in newer versions of Windows and Internet Explorer”. – David Braue

Related Articles

It's time to re-evaluate public cloud migration

The DTA's Hosting Certification Frameworks are a step in the right direction, but true data...

New Bill strengthens online powers for AFP, ACIC

Australian federal authorities have been granted online account takeover powers after a new Bill...

Cyber attacks: education, not awareness, key to reducing effects of crime

The increased frequency of cybersecurity advisories being published by governments is great for...


  • All content Copyright © 2021 Westwick-Farrow Pty Ltd