{"id":15187,"date":"2014-02-05T17:19:23","date_gmt":"2014-02-05T17:19:23","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1414"},"modified":"2020-02-26T10:47:17","modified_gmt":"2020-02-26T15:47:17","slug":"the-threat-landscape-in-2014-epidemics-followed-by-targeted-attacks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/the-threat-landscape-in-2014-epidemics-followed-by-targeted-attacks\/15187\/","title":{"rendered":"The threat landscape in 2014: epidemics followed by targeted attacks"},"content":{"rendered":"<p>Kaspersky Lab published a survey entitled \u201c<a href=\"https:\/\/www.kaspersky.com\/business-security\/threat-landscape-report?cid=b2b_sm_Blog_tl\" target=\"_blank\" rel=\"noopener nofollow\">The threat landscape: A practical guide from the Kaspersky Lab experts<\/a>\u201c. The survey focuses on businesses, which are now becoming the main objects of cybercriminals\u2019 interest.<\/p>\n<p>Over the past decade the threat landscape has significantly changed. Massive epidemics of viruses and worms are already in the past. The focus has shifted from cybervandalism, with the intention of making a show with millions of affected victims, towards making money. Actually, the attackers started working with greater stealth and precision, paying more attention to commercial organizations than end users.<\/p>\n<p>Today the world is ruled by exploits, designed for targeted activities by Trojans seeking to discreetly steal personal data (billing information is the grand prize) from other people\u2019s computers by rootkits and bootkits \u2013 the most dangerous types of malware to date. Trojans are particularly used to create botnets of infected computers, which are employed to send spam (including spam containing malicious codes) and launch DDoS attacks. Kaspersky Lab\u2019s survey specifies that DDoS attacks at commercial organizations are often used as a means of intimidation to threaten you with serious consequences if you do not pay the required money.<\/p>\n<div class=\"pullquote\">Massive epidemics of viruses and worms are already in the past, attackers have started working with greater stealth and precision, paying more attention to commercial organizations than end users.<\/div>\n<p>Trojans comprise a newfangled breed of extortionist malware (ransomware), which disables a user\u2019s machine or encrypts all the data on it and demands ransom for unlocking and decrypting it. As with the world\u2019s offline extortionists, compliance to their rules does not guarantee that the criminals will uphold their end of the deal.<\/p>\n<p>\u201cUntil a few years ago, most epidemics involved worms that hijacked the mail system to distribute themselves proactively, harvesting additional contacts from infected machines as they spread. Now, increasing numbers of malicious programs are being deliberately spammed to victim machines, allowing author(s) to control the distribution of their code to a targeted PC population, rather than letting it spread \u2018at will\u2019, the survey states.<\/p>\n<p>Such targeted populations often consist more and more of commercial companies\u2019 computers. More details are given in Kaspersky Lab\u2019s new report <a href=\"https:\/\/www.kaspersky.com\/business-security\/threat-landscape-report?cid=b2b_sm_Blog_tl\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab published a survey entitled \u201cThe threat landscape: A practical guide from the Kaspersky Lab experts\u201c. The survey focuses on businesses, which are now becoming the main objects of<\/p>\n","protected":false},"author":209,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[93,2069,2500],"class_list":{"0":"post-15187","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-business","7":"category-smb","8":"tag-cybercriminals","9":"tag-threat-landscape","10":"tag-tojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/the-threat-landscape-in-2014-epidemics-followed-by-targeted-attacks\/15187\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/the-threat-landscape-in-2014-epidemics-followed-by-targeted-attacks\/15187\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/the-threat-landscape-in-2014-epidemics-followed-by-targeted-attacks\/15187\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybercriminals\/","name":"cybercriminals"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15187"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15187\/revisions"}],"predecessor-version":[{"id":33034,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15187\/revisions\/33034"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}