Drive-bys Tops EU Threat Reports

Tuesday, January 8, 2013 @ 04:01 PM gHale


Drive-by exploits are now the top web cyber threat in the European Union.

That is the result of the EU’s cyber security agency ENISA’s first Cyber Threat Landscape analysis of 2012, summarizing over 120 threat reports. The report identifies and lists the top threats and their trends.

RELATED STORIES
Agencies Join in Security Plan
Ensuring Software Security Policies
Trojan that Supports Windows 8
Tracking Software Settlement

The identified top ten threats are:
• Drive-by exploits (malicious code injects to exploit web browser vulnerabilities)
• Worms/Trojans
1. Code injection attacks
• Exploit kits (ready to use software package to automate cybercrime)
• Botnets (remotely controlled hijacked computers)
• (Distributed) Denial of Service attacks (DDoS/DoS)
• Phishing (fraud mails and websites)
• Compromising confidential information (data breaches)
• Rogueware/scareware
• Spam

ENISA makes a series of conclusions for industry and stakeholders on how to better fight cyber threats to business, citizens and the digital economy at large:
• Use a common terminology within threat reports
• Include the end-user perspective
• Develop use cases for threat landscapes
• Collect security intelligence of incidents including starting point and target of an attack
• Perform a shift in security controls to accommodate emerging threat trends
• Collect and develop better evidence about attack vectors (methods) so as to understand attack workflows
• Collect and develop better evidence on the impact reached by attackers
• Collect and maintain more qualitative information about threat agents

The ENISA report summarizes 120 recent reports from 2011 and 2012 from the security industry, networks of excellence, standardization bodies and other independent parties.

The report provides an independent overview of observed threats and threat agents together with the current top threats, and emerging threat trend landscapes. Moreover, the Threat Landscape report analyses the “cyber enemy;” identifying and also listing the top ten (out of sixteen) threats in emerging technology areas.



Leave a Reply

You must be logged in to post a comment.