{"id":15029,"date":"2014-11-21T18:20:56","date_gmt":"2014-11-21T18:20:56","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2879"},"modified":"2020-02-26T10:57:48","modified_gmt":"2020-02-26T15:57:48","slug":"it-threat-evolution-q3-2014-arms-race-goes-on-who-wins","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/it-threat-evolution-q3-2014-arms-race-goes-on-who-wins\/15029\/","title":{"rendered":"IT Threat Evolution Q3 2014: arms race goes on, who wins?"},"content":{"rendered":"<p>Kaspersky Lab has released its report on cybersecurity in Q3, 2014. Highlights are: the Shellshock vulnerability, Crouching Yeti\/Energetic Bear, Epic Turla APT campaigns, a significant increase in the number of malicious attacks (of various kinds), and a burst of mobile banking Trojans. The full version is available <a href=\"https:\/\/securelist.com\/analysis\/quarterly-malware-reports\/67637\/it-threat-evolution-q3-2014\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>Shellshock, a.k.a. Bash Bug, loomed menacingly over the entire Q3. The scope of the event is actually so large that 2014 will probably remain in cybersecurity history as the year of Two <a href=\"https:\/\/business.kaspersky.com\/why-the-discovery-of-big-bugs-is-a-good-thing\/2695\" target=\"_blank\" rel=\"noopener nofollow\">Big Bugs<\/a>: <a href=\"https:\/\/business.kaspersky.com\/addressing-the-heartbleed-panic-advice-for-small-business-owners-2\/\" target=\"_blank\" rel=\"noopener nofollow\">Heartbleed<\/a>, discovered earlier this year, and <a href=\"https:\/\/www.kaspersky.com\/blog\/shellshock-how-to-check-and-update-potentially-vulnerable-systems\/15011\/\" target=\"_blank\" rel=\"noopener nofollow\">Shellshock<\/a>. Everything else seems pallid in comparison, but by no means should they be disregarded. Unfortunately, no one can promise that something comparable to Heartbleed and Shellshock isn\u2019t going to occur before the end of the year.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>IT #Threat Evolution Q3 2014: arms race goes on, who wins?<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7Auu&amp;text=+IT+%23Threat+Evolution+Q3+2014%3A+arms+race+goes+on%2C+who+wins%3F\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Overall, there was a strong increase in number of attacks from Q2 to Q3 \u2013 the amounts are varied, depending on the nature of the problem. There was a 33.1% increase in the number of malicious attacks blocked on the computers and mobile devices of Kaspersky Lab users; 31% more unique URLs that triggered web antivirus detections, a 14.4% increase in the number of mobile malware samples added to Kaspersky Lab\u2019s collection; there was 3.4 increase in the number of mobile banking Trojans, and the number of countries they have been detected in has grown twofold.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06020208\/Q3_2014_MW_Report_9-1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2881\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06020208\/Q3_2014_MW_Report_9-1.jpg\" alt=\"Q3_2014_MW_Report_9\" width=\"820\" height=\"523\"><\/a><\/p>\n<p>How should we interpret this data? Does it mean the onslaught of cybercrime and futility of all attempts to stop it? Apparently not.<\/p>\n<p>An increased number of attacks means the attacks were detected and thwarted. We should focus on the attacks\u2019 increasing futility. An increase in banking Trojans and the number of countries they infected means they are getting intercepted by security solutions, which decreases the threat they pose.<\/p>\n<p>Of course, both sides are perpetually improving their trade: cybercriminals write new malware and exploits, security vendors find a way to counter them, sometimes going to such great lengths that they launch large-scale operations to dismantle infrastructures behind botnets and (banking) Trojans. As with any arms race, new weaponry is constantly added.<\/p>\n<p>The number of threats, however, won\u2019t decrease \u2013 largely due to the fact that cybercrime is just too lucrative. There are potentially great profits to be had with moderate effort. And there is very little difference between \u201chi-tech\u201d and \u201ccommon\u201d crimes.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Q3 2014: A Big Bug, large APT campaigns discovered, banking Trojan keep increasing #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7Auu&amp;text=Q3+2014%3A+A+Big+Bug%2C+large+APT+campaigns+discovered%2C+banking+Trojan+keep+increasing+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Hi-tech crime efforts don\u2019t have to be great as long as there are large numbers of exploitable vulnerabilities in the software. More importantly, the number of people who <a href=\"https:\/\/business.kaspersky.com\/vulnerable-android-and-the-negligence-of-users\/1091\" target=\"_blank\" rel=\"noopener nofollow\">don\u2019t care much about their devices\u2019 security<\/a> is quite large. According to a recent survey, <a href=\"https:\/\/business.kaspersky.com\/cyberthreats-not-a-matter-of-faith\/2837\" target=\"_blank\" rel=\"noopener nofollow\">1 of 8 people just don\u2019t believe cyberthreats are real<\/a>. That makes them extremely vulnerable to the attacks, but not just them: cyber-incidents usually have some \u201carea of effect,\u201d affecting more than just a single target. Cybersecurity is everyone\u2019s business.<\/p>\n<p>The full text of the Kaspersky Lab\u2019s IT Threat Evolution Q3 report is available <a href=\"https:\/\/securelist.com\/analysis\/quarterly-malware-reports\/67637\/it-threat-evolution-q3-2014\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab released its new IT Threat Evolution Q3 2014 report, dedicated to the most important security incidents and trends in the cybersecurity sphere. It may seem like attacks are increasing more rapidly than ever, but it&#8217;s detection rates that are growing.<\/p>\n","protected":false},"author":209,"featured_media":15856,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[282,2022,2234,2235],"class_list":{"0":"post-15029","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersecurity","10":"tag-kaspersky-lab-reports","11":"tag-q3","12":"tag-threat-evolution"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/it-threat-evolution-q3-2014-arms-race-goes-on-who-wins\/15029\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/it-threat-evolution-q3-2014-arms-race-goes-on-who-wins\/15029\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/it-threat-evolution-q3-2014-arms-race-goes-on-who-wins\/15029\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15029"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15029\/revisions"}],"predecessor-version":[{"id":33391,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15029\/revisions\/33391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15856"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}