{"id":3465,"date":"2015-01-05T09:00:34","date_gmt":"2015-01-05T09:00:34","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3465"},"modified":"2020-02-26T10:58:53","modified_gmt":"2020-02-26T15:58:53","slug":"year-2014-in-security-looking-back-over-ones-shoulder","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/year-2014-in-security-looking-back-over-ones-shoulder\/3465\/","title":{"rendered":"Year 2014 in security: looking back over one&#8217;s shoulder"},"content":{"rendered":"<p>2014 has come and gone, along with \u2013 unfortunately \u2013 the Christmas and New Year holidays. Perhaps now would be a good time to look back on 2014 and its business security highlights, since the year was heavy with notable security events and incidents. It would probably make it into history books on cybersecurity, and it would be nice if we help write them. :-)<\/p>\n<p style=\"text-align: center;\">\n<\/p><p>As a matter of fact, we published pieces on the most important highlights of the last year. Here they are:<\/p>\n<p><strong>The largest data leaks<\/strong><\/p>\n<p><a href=\"https:\/\/business.kaspersky.com\/2014-the-year-of-retailers-getting-hacked-over-and-over-again\/3452\" target=\"_blank\" rel=\"noopener nofollow\">There were quite a few<\/a>: In late 2013, Target Corporation disclosed a massive leak of payment data, which was followed by similar announcements from retailers throughout 2014, especially in the US.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Year 2014 in #security: looking back over one\u2019s shoulder<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F64pe&amp;text=Year+2014+in+%23security%3A+looking+back+over+one%26%238217%3Bs+shoulder\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Neiman Marcus, Michaels Stores, UPS, and The Home Depot \u2013 all fell victim to the various strains of <a href=\"https:\/\/business.kaspersky.com\/what-is-pos-malware-and-why-does-it-cost-millions\/2457\" target=\"_blank\" rel=\"noopener nofollow\">PoS malware<\/a>. For more details read \u201c2014: the year of retailers getting hacked over and over again.\u201d<\/p>\n<p>Then there was the <a href=\"https:\/\/business.kaspersky.com\/with-the-doors-wide-open-yet-another-sony-megahack\/3408\" target=\"_blank\" rel=\"noopener nofollow\">Sony Pictures Entertainment hack<\/a>. The criminals seem to \u201clove\u201d Sony: Back in 2011, hackers hit the Sony PlayStation Network, stealing massive amounts of various data \u2013 mostly due to lax security. The same thing happened with the SPE hack and the damage was, again, massive.<\/p>\n<p><strong>Windows XP \u2013 gone to stay<\/strong><\/p>\n<p>On April 8<sup>th<\/sup>, Microsoft finally <a href=\"https:\/\/business.kaspersky.com\/windows-xp-the-immortal-operating-system\/1621\" target=\"_blank\" rel=\"noopener nofollow\">dropped Windows XP support<\/a>. This was long overdue as the venerable XP was 14 years old and had lots of bugs. Immediately after, Microsoft <a href=\"https:\/\/business.kaspersky.com\/ie-0day-and-windows-xp-microsofts-tough-decision\/1760\" target=\"_blank\" rel=\"noopener nofollow\">decided to release an urgent patch for Windows products family<\/a>, and included Windows XP due to the severity of the problem.<\/p>\n<p>As a matter of fact, Windows XP <a href=\"https:\/\/business.kaspersky.com\/windows-xp-bad-things-live-on\/1914\" target=\"_blank\" rel=\"noopener nofollow\">is still pretty much alive<\/a>. It has a <a href=\"https:\/\/business.kaspersky.com\/survey-windows-xp-share-is-still-above-16\/2406\" target=\"_blank\" rel=\"noopener nofollow\">considerable user base<\/a>, and its embedded variants, such as Windows Embedded POSReady 2009, are used in PoS terminals. It is still entrenched in ATMs as well.<\/p>\n<p>And the bugs are still being found.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/01\/06020237\/2014_wide-1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3467\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/01\/06020237\/2014_wide-1.jpg\" alt=\"2014_wide\" width=\"1000\" height=\"667\"><\/a><\/p>\n<p><strong>Big Bugs<\/strong><\/p>\n<p>This will be a peculiar chapter in the aforementioned \u201chistory books\u201d. Most likely for the first time, major flaws discovered in widely used software began receiving their own nicknames, the same as malware and APTs. <a href=\"https:\/\/business.kaspersky.com\/why-the-discovery-of-big-bugs-is-a-good-thing\/2695\" target=\"_blank\" rel=\"noopener nofollow\">Probably a good thing<\/a>, since this brings extra attention from the general public. Just compare the impression of \u201ca critical flaw in bash\u201d and \u201cShellshock bug\u201d.<\/p>\n<p>Over the year we heard about <a href=\"https:\/\/business.kaspersky.com\/the-heartbleed-bug-averting-a-doomsday\" target=\"_blank\" rel=\"noopener nofollow\">Heartbleed<\/a>, then <a href=\"https:\/\/business.kaspersky.com\/when-the-bug-bashes-you\/2649\" target=\"_blank\" rel=\"noopener nofollow\">Shellshock<\/a>, and by the end of the year WinShock, a less prominent \u2013 but also serious \u2013 <a href=\"https:\/\/business.kaspersky.com\/a-legacy-bug-in-a-legacy-code-todays-problem\/2863\" target=\"_blank\" rel=\"noopener nofollow\">19-year-old bug in Windows arrived<\/a>.<\/p>\n<p><strong>APTs and banking malware<\/strong><\/p>\n<p>A lot of APTs have been publicized this year, even if they were discovered earlier. See the list below:<\/p>\n<ul>\n<li><a href=\"https:\/\/securelist.com\/blog\/events\/58238\/a-glimpse-behind-the-mask\/\" target=\"_blank\" rel=\"noopener\">Careto\/Mask<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/miniduke-is-back\/2189\" target=\"_blank\" rel=\"noopener nofollow\">Miniduke<\/a>\/<a href=\"https:\/\/securelist.com\/blog\/incidents\/64107\/miniduke-is-back-nemesis-gemina-and-the-botgen-studio\/\" target=\"_blank\" rel=\"noopener\">CosmicDuke<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/crouching-yeti-got-caught-anyway\/2309\" target=\"_blank\" rel=\"noopener nofollow\">Energetic Bear\/Crouching Yeti<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/epic-turla-catching-the-reptiles-tail\/2350\" target=\"_blank\" rel=\"noopener nofollow\">Epic Turla<\/a> (<a href=\"https:\/\/business.kaspersky.com\/no-penguin-left-behind-epic-turla-apts-linux-component-discovered\/3435\" target=\"_blank\" rel=\"noopener nofollow\">with late additions<\/a>)<\/li>\n<li><a href=\"https:\/\/securelist.com\/blog\/research\/66108\/el-machete\/\" target=\"_blank\" rel=\"noopener\">El Machete<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/the-dark-story-of-darkhotel\/2829\" target=\"_blank\" rel=\"noopener nofollow\">Darkhotel<\/a><\/li>\n<li><a href=\"https:\/\/securelist.com\/blog\/research\/67741\/regin-nation-state-ownage-of-gsm-networks\/\" target=\"_blank\" rel=\"noopener\">Regin<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/partly-cloudy-october-a-spiritual-successor-to-redoctober-apt-revealed\/3428\" target=\"_blank\" rel=\"noopener nofollow\">Cloud Atlas<\/a><\/li>\n<\/ul>\n<p>Their numbers were published back in December, a couple of weeks after Kaspersky Lab launched its <a href=\"https:\/\/apt.securelist.com\/\" target=\"_blank\" rel=\"noopener\">new interactive map dedicated to the targeted threats<\/a>.<\/p>\n<p>Banking malware, in turn, hit headlines regularly throughout 2014 \u2013 money-stealing Trojans become a threat that cost businesses and banks millions. Various ZeuS Trojan derivatives formed large botnets, and it took a formidable joint effort between law enforcement agencies and security vendors to bring down just one of them \u2013 <a href=\"https:\/\/business.kaspersky.com\/hunting-the-hydra-why-gameover-zeus-botnet-is-here-to-stay\/2265\" target=\"_blank\" rel=\"noopener nofollow\">Gameover ZeuS<\/a>. Although it was immediately clear that it was just a matter of time before another ZeuS-based botnet would emerge.<\/p>\n<p>By the end of the year a new, modular ZeuS derivative \u2013 <a href=\"https:\/\/business.kaspersky.com\/chthonic-son-of-zeus-a-new-endurance-trial-for-banks\/3457\" target=\"_blank\" rel=\"noopener nofollow\">Chthonic<\/a> \u2013 drew a lot of attention.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Year 2014: heavy with incidents and gloomy discoveries #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F64pe&amp;text=Year+2014%3A+heavy+with+incidents+and+gloomy+discoveries+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Ransomware<\/strong><\/p>\n<p>Various encrypting and non-encrypting <a href=\"https:\/\/business.kaspersky.com\/ten-facts-about-ransomware\/3400\" target=\"_blank\" rel=\"noopener nofollow\">ransomware<\/a> cost businesses dearly, with Cryptolocker becoming the most prominent threat \u2013 and probably the most profitable malware of its kind. At least some of our readers ran into it, hopefully without a lot of damage inflicted upon them.<\/p>\n<p>For a more detailed overview of the 2014 threats landscape visit Securelist\u2019s report and Kaspersky Security Bulletin 2014, available <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/68010\/kaspersky-security-bulletin-2014-overall-statistics-for-2014\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2014 is over, as are the holidays. Time to look back at the business security highlights of past the year.<\/p>\n","protected":false},"author":209,"featured_media":15793,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2270,783,2248,422,2271],"class_list":{"0":"post-3465","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apts-in-2014","10":"tag-business-security","11":"tag-cybersecurity-in-2014","12":"tag-threats","13":"tag-year-in-review"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/year-2014-in-security-looking-back-over-ones-shoulder\/3465\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/year-2014-in-security-looking-back-over-ones-shoulder\/3465\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/year-2014-in-security-looking-back-over-ones-shoulder\/3465\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apts-in-2014\/","name":"APTs in 2014"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3465"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3465\/revisions"}],"predecessor-version":[{"id":33429,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3465\/revisions\/33429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15793"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}