{"id":13229,"date":"2012-02-23T21:21:51","date_gmt":"2012-02-24T02:21:51","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-08-26T16:35:39","modified_gmt":"2022-08-26T20:35:39","slug":"mcafee-labs-2012-threat-predictions","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/mcafee-labs-2012-threat-predictions\/","title":{"rendered":"McAfee Labs 2012 Threat Predictions"},"content":{"rendered":"<p><a title=\"McAfee Labs 2012 Threat Predictions\" href=\"https:\/\/community.ebay.com\/t5\/Archive-The-Soapbox\/Let-me-look-into-my-crystal-ball\/td-p\/18899771\/page\/5\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-102622\" title=\"McAfee Labs 2012 Threat Predictions\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-1.jpg?resize=121%2C100&#038;ssl=1\" alt=\"McAfee Labs 2012 Threat Predictions\" width=\"121\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-1.jpg?resize=150%2C124&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-1.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-1.jpg?resize=768%2C636&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-1.jpg?resize=1024%2C848&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-1.jpg?w=1181&amp;ssl=1 1181w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-1.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" \/><\/a>Computer security company <strong><a title=\"McAfee\" href=\"https:\/\/www.mcafee.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">McAfee<\/a><\/strong> unveiled its <a title=\"www.mcafee.com\" href=\"https:\/\/web.archive.org\/web\/20170330144703\/https:\/\/www.mcafee.com\/us\/resources\/reports\/rp-threat-predictions-2012.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Threat Predictions<\/strong><\/a> report (PDF), outlining the top <a title=\"Computer security\" href=\"https:\/\/www.michigan.gov\/cybersecurity\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">cybersecurity<\/a> threats organizations and individuals are likely to face in 2012. McAfee, a wholly-owned subsidiary of <a title=\"Intel\" href=\"https:\/\/www.intel.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Intel<\/a> (<a title=\"HASDAQ : INTC\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-INTC\/\" target=\"_blank\" rel=\"noopener noreferrer\">INTC<\/a>), says that for the most part, <strong>2012 looks like it will look like 2011 only worse<\/strong>, with many of the recent threats gaining momentum. Here are the\u00a0predictions:<\/p>\n<p><strong><a href=\"http:\/\/www.bestbuytoday.com\/telephone-poles\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102624 size-thumbnail\" title=\"Industrial Attacks:\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/telephone-poles.png?resize=75%2C75&#038;ssl=1\" alt=\"Industrial Attacks:\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/telephone-poles.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/telephone-poles.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/telephone-poles.png?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Industrial Attacks:<\/strong> Cyber-criminals will target Water, electricity, oil, and gas utilities. These are essential services to everyday lives, yet many industrial systems are not ready for cyber-attacks according to McAfee. Many of the environments where <a title=\"SCADA\" href=\"https:\/\/en.wikipedia.org\/wiki\/SCADA\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">SCADA<\/a> (supervisory control and data acquisition) systems are deployed don\u2019t have stringent security practices. McAfee predicts attackers will leverage this lack of preparedness with greater frequency, if only for blackmail or extortion in 2012.<\/p>\n<p><strong>Legalized Spam:<\/strong> McAfee Labs says global <a title=\"Spam (electronic)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Spam_%28electronic%29\" target=\"_blank\" rel=\"noopener noreferrer\">spam<\/a> volumes have declined in the past two years. However, legitimate advertisers are picking up where the spammers left off using the same spamming techniques, such as purchasing third-party email lists or databases from companies going out of business. McAfee Labs expects to see this &#8220;legal&#8221; spam and the technique known as &#8220;snowshoe spamming&#8221; continue to grow at a faster rate than illegal phishing and confidence scams.<\/p>\n<p><strong><a href=\"https:\/\/web.archive.org\/web\/20110228050226\/http:\/\/www.maximumpc.com:80\/article\/news\/worlds_first_cell_phone_botnet_could_be_coming_soon\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102626 size-thumbnail\" title=\"Mobile Threats\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-1.jpg?resize=75%2C61&#038;ssl=1\" alt=\"Mobile Threats\" width=\"75\" height=\"61\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-1.jpg?resize=75%2C61&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-1.jpg?resize=150%2C123&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus-1.jpg?w=270&amp;ssl=1 270w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Mobile Threats:<\/strong> 2011 has seen the largest levels in mobile malware history, <a title=\"wikipedia.org\" href=\"https:\/\/en.wikipedia.org\/wiki\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee<\/a> Labs expects that continue in 2012. They expect mobile attackers to improve on their skill set and move toward <a title=\"Mobile banking\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_banking\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">mobile banking<\/a> attacks. Techniques previously dedicated for online banking, such as stealing from victims while they are still logged on while making it seem that transactions are coming from the legitimate user, will now target mobile banking users. <a title=\"McAfee Labs\" href=\"http:\/\/www.mcafee.com\/us\/mcafee-labs.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Labs<\/a> expects attackers will bypass PCs and go straight after mobile banking apps, as more and more users handle their finances on mobile devices.<\/p>\n<p><strong><a title=\"Embedded system\" href=\"http:\/\/en.wikipedia.org\/wiki\/Embedded_system\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Embedded Hardware<\/a>:<\/strong> <a title=\"Embedded system\" href=\"https:\/\/en.wikipedia.org\/wiki\/Embedded_system\" target=\"_blank\" rel=\"noopener noreferrer\">Embedded systems<\/a> are designed for a specific control function within a larger system, and are commonly used in automotive, medical devices, <a title=\"Global Positioning System\" href=\"http:\/\/www8.garmin.com\/aboutGPS\/\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">GPS devices<\/a>, routers, digital cameras, and printers. McAfee Labs expects to see proofs-of-concept codes exploiting embedded systems to become more effective in 2012 and beyond. This will require malware that attacks at the hardware layer and will enable attacks to gain greater control and keep up long-term access to the system and its data. Sophisticated hackers will then have complete control over hardware.<\/p>\n<p><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111605\" title=\"countries prove their cyber war capabilities\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_Terrorism.jpg?resize=110%2C115&#038;ssl=1\" alt=\"countries prove their cyber war capabilities\" width=\"110\" height=\"115\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_Terrorism.jpg?w=133&amp;ssl=1 133w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_Terrorism.jpg?resize=72%2C75&amp;ssl=1 72w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/>Cyberwar:<\/strong> Countries are vulnerable due to massive dependence on computer systems and a cyber-defense that primarily defends only government and military networks. Many countries realize the crippling potential of cyber attacks against critical infrastructures, such as water, gas, and power, and how difficult it is to defend against them. McAfee Labs expects to see countries prove their cyberwar capabilities in 2012, to send a message.<\/p>\n<p><strong>Rogue Certificates:<\/strong> Organizations and individuals tend to trust digitally signed certificates, however, recent threats such as <a title=\"Stuxnet\" href=\"https:\/\/www.trellix.com\/en-us\/security-awareness\/ransomware\/what-is-stuxnet.html\" target=\"_blank\" rel=\"noopener noreferrer\">Stuxnet<\/a> and <a title=\"Duqu\" href=\"https:\/\/web.archive.org\/web\/20220216061918\/https:\/\/www.cisa.gov\/uscert\/ics\/jsar\/JSAR-11-312-01\" target=\"_blank\" rel=\"noopener noreferrer\">Duqu<\/a> used rogue certificates to evade detection. McAfee Labs expects to see the production and circulation of fake rogue certificates increase in 2012. Wide-scale targeting of certificate authorities and the broader use of fraudulent digital certificates will affect key infrastructure, secure browsing and transactions as well as host-based technologies such as whitelisting and application control.<\/p>\n<p><strong><a href=\"https:\/\/www.quora.com\/Do-intellectuals-make-bad-politicians\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102628\" title=\"Legislative Issues\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-1.jpg?resize=92%2C100&#038;ssl=1\" alt=\"Legislative Issues\" width=\"92\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-1.jpg?resize=138%2C150&amp;ssl=1 138w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-1.jpg?resize=69%2C75&amp;ssl=1 69w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-1.jpg?w=559&amp;ssl=1 559w\" sizes=\"auto, (max-width: 92px) 100vw, 92px\" \/><\/a>Legislative Issues:<\/strong> DNSSEC (<a title=\"Domain Name System Security Extensions\" href=\"https:\/\/en.wikipedia.org\/wiki\/Domain_Name_System_Security_Extensions\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Domain Name System Security Extensions<\/a>) is designed to protect a client computer from inadvertently communicating with a host as a result of a man-in-the-middle attack. Governing bodies around the globe are taking a greater interest in establishing &#8220;rules of the road&#8221; for Internet traffic, and McAfee Labs expects to see more and more instances where legislative issues hamper future solutions.<\/p>\n<p><strong>Hacktivism:<\/strong> McAfee Labs predicts that in 2012 digital disruptions like Anonymous will join forces with physical demonstrators and will target public figures such as politicians, industry leaders, judges, and law enforcement, more than ever before.<\/p>\n<p><strong><a href=\"https:\/\/bitcoin.org\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102632\" title=\"Virtual Currency\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitcoin-2.png?resize=85%2C85&#038;ssl=1\" alt=\"Virtual Currency\" width=\"85\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitcoin-2.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitcoin-2.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitcoin-2.png?w=680&amp;ssl=1 680w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/><\/a>Virtual Currency:<\/strong> McAfee Labs expects cryptocurrency will be an attractive target for cybercriminals.\u00a0 to see threats evolve to steal money from unsuspecting victims or to spread malware.<\/p>\n<p><strong>Hardware Attacks:<\/strong> McAfee Labs expects to see more effort put into hardware and firmware exploits to create persistent malware in network cards, hard drives, and even system BIOS (<a title=\"BIOS\" href=\"https:\/\/en.wikipedia.org\/wiki\/BIOS\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Basic Input Output System<\/a>). and their related real-world attacks through 2012.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/techcrunch.com\/2012\/02\/23\/former-mcafee-cto-debuts-stealthy-security-technology-startup-crowdstrike-with-26m-in-funding\/\" target=\"_blank\" rel=\"noopener noreferrer\">Former McAfee CTO Debuts Stealthy Security Technology Startup CrowdStrike With $26M In Funding<\/a> (techcrunch.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee predictions for 2012 there will be Industrial Attacks on Cryptocurrency and Hardware Rogue Certificates and cyberwar<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,1798,1061,2755,102,2971,404,431,813,21,941,4,95,1797],"class_list":["post-13229","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-banking","tag-bios","tag-cryptocurrency","tag-embedded","tag-hacktivism","tag-mcafee","tag-mobile","tag-mobile-device","tag-pc","tag-scada","tag-security","tag-spam","tag-system"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/13229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=13229"}],"version-history":[{"count":20,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/13229\/revisions"}],"predecessor-version":[{"id":132658,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/13229\/revisions\/132658"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=13229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=13229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=13229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}