{"id":3497,"date":"2015-01-21T18:59:28","date_gmt":"2015-01-21T18:59:28","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3497"},"modified":"2020-02-26T10:59:20","modified_gmt":"2020-02-26T15:59:20","slug":"an-outlandish-top-10-of-cybersecurity-events-in-2014","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/an-outlandish-top-10-of-cybersecurity-events-in-2014\/3497\/","title":{"rendered":"An outlandish Top 10 of cybersecurity events in 2014"},"content":{"rendered":"<p>\u201cThreat landscape\u201d is a common phrase used in cybersecurity. It governs whether companies choose to buy new hardware or to spend money protecting existing infrastructure. Dependence is direct: If your trains get derailed all the time, buying new locomotives isn\u2019t a solution.<\/p>\n<p>There are various ways to assess this landscape on a scale of \u201camiable\u201d to \u201cgloomy \u201c. Here are a few assessments from our experts: <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/68052\/kaspersky-security-bulletin-2014-malware-evolution\/\" target=\"_blank\" rel=\"noopener\">2014 summary<\/a>, <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/67864\/kaspersky-security-bulletin-2014-predictions-2015\/\" target=\"_blank\" rel=\"noopener\">predictions for 2015<\/a> and, for the number lovers, <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/68010\/kaspersky-security-bulletin-2014-overall-statistics-for-2014\/\" target=\"_blank\" rel=\"noopener\">the figures<\/a>. But what do companies think? We poll them regularly (<a href=\"https:\/\/business.kaspersky.ru\/obzor-riskov-it-bezopasnosti-2014-nikomu-poshhady-net\/2099\/\" target=\"_blank\" rel=\"noopener nofollow\">see here for details<\/a>), but this year we decided to use a non-conventional method as well.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>An outlandish Top 10 of #cybersecurity events in 2014<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FpNu9&amp;text=An+outlandish+Top+10+of+%23cybersecurity+events+in+2014\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Our <a href=\"https:\/\/threatpost.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a> site follows all the meaningful news regarding IT security. We decided to pick the top 10 events of the past year by a single criterion: the popularity of the corresponding articles. The results were interesting. There was no politics (no Snowden, no NSA) and few topics of strategic nature. The problems that stand out are those that have to be considered when assessing the threat landscape right now.<\/p>\n<p style=\"text-align: center\">\n<\/p><p><strong>10. TrueCrypt: the first (relatively) verified distribution after the epic fail in May<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/audit-project-releases-verified-repositories-of-truecrypt-7-1a\/106569\" target=\"_blank\" rel=\"noopener nofollow\">The Story<\/a>. <a href=\"https:\/\/business.kaspersky.com\/truecrypt-unexplained-disappearance\/1931\" target=\"_blank\" rel=\"noopener nofollow\">Drama in detail<\/a>.<\/p>\n<p>\u201cGuys, here\u2019s the thing. TrueCrypt\u2019s insecure, but we\u2019re not gonna tell you why. Use the standard encryption in Windows. And we\u2019re off. See ya\u201d.<\/p>\n<p>That\u2019s the loosely interpreted meaning of the message from developers of a popular TrueCrypt encryption system (it\u2019s still <a href=\"http:\/\/truecrypt.sourceforge.net\/\" target=\"_blank\" rel=\"noopener nofollow\">available here<\/a>, by the way). When you choose your protection \u2013 paid or free, encryption or antivirus \u2013 you assess the convenience, functionality, and effectiveness of the approach to security. But first you must trust it since auditing the code \u2013 even if it is freely available \u2013 is a bit too costly.<\/p>\n<p>In the case of TrueCrypt, we had an efficient, easy and free encryption tool, developed by an anonymous group of authors. It\u2019s still unclear what the hell happened. Either there was a bug that couldn\u2019t be fixed, or authorities \u201crecommended\u201d to desist, or they just got tired of coding. More than half a year has passed, and we\u2019re not apparently going to learn the truth in full.<\/p>\n<p>The only hope here is a collective initiative <a href=\"https:\/\/opencryptoaudit.org\/\" target=\"_blank\" rel=\"noopener nofollow\">Open Crypto Audit Project<\/a>, which aims to audit TrueCrypt\u2019s code \u2013 and not just that. By the end of June, a verified distribution of TrueCrypt v.7.1a <a href=\"https:\/\/github.com\/AuditProject\/truecrypt-verified-mirror?files=1\" target=\"_blank\" rel=\"noopener nofollow\">appeared on Guthub<\/a>. Does it mean that all bugs have been discovered and everything\u2019s alright now? Nope, far from it. For now, they have only learnt that sources and builds of this version are indeed sources and builds of this particular version. The 7.1a code was analyzed in the first part of the audit (results were <a href=\"https:\/\/opencryptoaudit.org\/reports\/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf\" target=\"_blank\" rel=\"noopener nofollow\">revealed<\/a> in April). Now we\u2019re waiting for the next part. Progress can be followed <a href=\"http:\/\/istruecryptauditedyet.com\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p><strong>9. DDoS against UltraDNS<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/ultradns-dealing-with-ddos-attack\/105806\" target=\"_blank\" rel=\"noopener nofollow\">The story<\/a><\/p>\n<p>April 100Gbps DDoS attack on UltraDNS using DNS amplification rendered quite a few clients inaccessible for hours. There was nothing particularly special in comparison to other DDoS attacks that reached up to <a href=\"https:\/\/threatpost.com\/ntp-amplification-blamed-for-400-gbps-ddos-attack\/104201\" target=\"_blank\" rel=\"noopener nofollow\">400Gbps<\/a> (these used NTP protocol flaws). The problem is that such attacks became commonplace. Unlike the most complex, usually narrowly targeted threats (check out our <a href=\"https:\/\/securelist.com\/blog\/research\/67741\/regin-nation-state-ownage-of-gsm-networks\/\" target=\"_blank\" rel=\"noopener\">report on Regin campaign<\/a> that has only 27 victims), DDoS is a universal problem. At least 18% of companies worldwide have been hit with DDoS, according to our data. And if spam (which is the number one problem) harms only indirectly, website inaccessibility has a real impact: It means missed sales and reputation losses. The primary trend of this year is amplified DDoS attacks, using the flaws in fundamental network protocols, along with a combination of DDoS and targeted attacks in a manner like \u201cstun and steal the wallet\u201d. We\u2019ll get back to this topic a bit later.<\/p>\n<p>Here\u2019s a detailed <a href=\"https:\/\/securelist.com\/analysis\/publications\/64361\/versatile-ddos-trojan-for-linux\/\" target=\"_blank\" rel=\"noopener\">description of a DDoS Trojan for Linux<\/a>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/01\/06020240\/darkhotel1-1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3502\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/01\/06020240\/darkhotel1-1.jpg\" alt=\"darkhotel\" width=\"800\" height=\"800\"><\/a><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/securelist.com\/blog\/research\/66779\/the-darkhotel-apt\/\" target=\"_blank\" rel=\"noopener\"><em>Dark Hotel<\/em><\/a><em>\u00a0APT \u2013 a non-conventional way to steal data from traveling employees<\/em><\/p>\n<p><strong>8. Passcode bypass in iOS 7.1.1<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/passcode-bypass-bug-and-email-attachment-encryption-plague-ios-7-1-1\/105910\" target=\"_blank\" rel=\"noopener nofollow\">The Story<\/a><\/p>\n<p>The April iOS update to version 7.1.1 as well as a Mac OS X patch actually fixed a serious flaw in Apple\u2019s implementation of SSL protocol (not <a href=\"https:\/\/business.kaspersky.com\/the-heart-is-bleeding-out-a-new-critical-bug-found-in-openssl\" target=\"_blank\" rel=\"noopener nofollow\">this one<\/a>, though). As it often happens, new bugs arrived, one of which made it possible to partially circumvent locks on Apple iPhone 5\/5s and get access to the address book.<\/p>\n<p>As we all know, any Apple-related news is a potent traffic generator, so the flaws in Apple\u2019s devices couldn\u2019t help making their way into our top list. As with UltraDNS it is not the flaw itself that\u2019s notable, but the industry\u2019s attention to mobile devices. Companies increasingly see them as a threat, although they understand that prohibiting smartphones in the workplace isn\u2019t going to work.<\/p>\n<p>According to our data, 22% of companies faced security issues related to loss or theft of mobile devices. Thus, any circumvention of security measures is indeed a problem \u2013 especially if the corporate smartphones weren\u2019t protected well enough, or if the protection systems were out of commission. Besides the passcode circumvention there was yet another problem in the same version of iOS: e-mail encryption did not cover the attachments. Access to the phone\u2019s file system provided access to the attachments, too.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/01\/06020239\/epicturla1-1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3503\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/01\/06020239\/epicturla1-1.jpg\" alt=\"epicturla\" width=\"800\" height=\"800\"><\/a><\/p>\n<p style=\"text-align: center\">Epic Turla \u2014 a <a href=\"https:\/\/securelist.com\/blog\/virus-watch\/58551\/agent-btz-a-source-of-inspiration\/\" target=\"_blank\" rel=\"noopener\">research<\/a> of complex connections between different APTs.<\/p>\n<p style=\"text-align: left\"><strong>7. The Internet is broken, act accordingly<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/the-internet-is-broken-act-accordingly\/104141\" target=\"_blank\" rel=\"noopener nofollow\">The Story<\/a><\/p>\n<p>If someone asked me to use non-verbal means to express the situation with security on the Web, using two music videos, I\u2019d do it the following way (you\u2019re welcome to offer your variants in the comments, let\u2019s talk about music associations!).<\/p>\n<p><strong>The ideal situation:<\/strong><\/p>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"560\" height=\"349\" src=\"https:\/\/www.youtube.com\/embed\/2Z4m4lnjxkY?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span>\n<p><strong>The reality:<\/strong><\/p>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"560\" height=\"349\" src=\"https:\/\/www.youtube.com\/embed\/g6zT3kVtpHc?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span>\n<p>The situation with Web security has been well expressed by Costin Raiu, our experts team leader: the Internet is broken. It\u2019s not paranoia, FUD, or advertising. That\u2019s the way things are now. Anywhere you look there are vast and barely fixable problems: with critical protocols, with encryption, with email, with Web, etc.<\/p>\n<p>What do we do? Getting back to typewriters <a href=\"https:\/\/business.kaspersky.com\/steady-rolling-back-to-the-stone-age\/2526\" target=\"_blank\" rel=\"noopener nofollow\">is not going to help<\/a>. We need to take this into consideration and build our defense strategy accordingly.<\/p>\n<p><strong>6. Tor malicious node<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/researcher-finds-tor-exit-node-adding-malware-to-binaries\/109008\" target=\"_blank\" rel=\"noopener nofollow\">The Story <\/a><\/p>\n<p>One more curious story about the trust put into protection systems, this time to make tools anonymous. In late October, security researcher Josh Pitts discovered an outgoing node in Tor, which added on the fly a malicious code to any executable file downloaded by a user. Located in Russia, this node had been promptly blocked off by Tor administration. The only way to protect yourself from such attacks is clear: trust no one. Or, to be more specific: an extra encryption layer will always come in handy. HTTPs traffic isn\u2019t susceptible to this hack, of course.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/01\/06020239\/maskcareto-1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3498\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/01\/06020239\/maskcareto-1.jpg\" alt=\"maskcareto\" width=\"800\" height=\"800\"><\/a><\/p>\n<p style=\"text-align: center\">A crossplatform (Windows, Max OS X, Linux, iOS) espionage campaign <a href=\"https:\/\/securelist.com\/blog\/research\/58254\/the-caretomask-apt-frequently-asked-questions\/\" target=\"_blank\" rel=\"noopener\">The Mask\/Careto<\/a>.<\/p>\n<p><strong>5.<\/strong>\u00a0<strong>DDoS + Targeted attack. Code Spaces dissolution<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/hacker-puts-hosting-service-code-spaces-out-of-business\/106761\" target=\"_blank\" rel=\"noopener nofollow\">The story<\/a><\/p>\n<p>When the Target Corporation <a href=\"https:\/\/www.kaspersky.com\/blog\/ram-scrapers-and-other-point-of-sale-malware\/\" target=\"_blank\" rel=\"noopener nofollow\">lost data on some 70 million clients to a malware<\/a>, it was less than pleasant, but the shops stayed where they were. If your business is 100% online, a targeted attack may ruin it in no time. That\u2019s what happened in June 2014 to Code Spaces, the vendor of a code-hosting and software collaboration platform.<\/p>\n<p>The hacking of a control panel at Amazon EC2 followed the initial DDoS attack on the company\u2019s server. Then the Code Spaces\u2019 developers got blackmailed. All attempts to recover data were futile: the attacker regained control and deleted nearly everything. In 12 hours the company was down: there was no way to recover data, compensate the losses and, above all, restore their reputation.<\/p>\n<p>The older version of Code Spaces\u2019 <a href=\"http:\/\/www.codespaces.com\/\" target=\"_blank\" rel=\"noopener nofollow\">site<\/a> specifically emphasized the reliability of data backup: \u201cBacking up data is one thing, but it is meaningless without a recovery plan, not only a recovery plan \u2013 but one that is well-practiced and proven to work time and time again\u201d. Well said!<\/p>\n<p><strong>4. POOOOOOODLE<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/browser-vendors-move-to-disable-sslv3-in-wake-of-poodle-attack\/108852\" target=\"_blank\" rel=\"noopener nofollow\">The story <\/a><\/p>\n<p>Another fashionable trend in IT security this year: giving non-conventional names not just to malware, but to bugs and attack scenarios as well. POODLE stands for Padding Oracle On Downgraded Legacy Encryption. The subject-matter of the attack: to force the client and server \u2013 while establishing the secure connection \u2013 to downgrade from a secure TLS protocol to an insecure and obsolete one \u2013 SSL 3.0, which will be 18-years-old this year. In some conditions there is the possibility of intercepting the secure traffic and stealing cookies with consequent interception of the entire session. The required conditions are so specific that there were no real cases of exploitation detected so far. Still, all main browser vendors released a patch disabling SSLv3, which fixes the problem. Of all the unpleasant news of 2014, this one looks the most positive: the flaw is detected, the flaw is promptly fixed. Well, almost.<\/p>\n<p><strong>3. Shellshock<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/major-bash-vulnerability-affects-linux-unix-mac-os-x\/108521\" target=\"_blank\" rel=\"noopener nofollow\">The<\/a> story. <a href=\"https:\/\/business.kaspersky.com\/bashbugshellshock-the-day-after\/2656\" target=\"_blank\" rel=\"noopener nofollow\">Background<\/a>. <a href=\"https:\/\/securelist.com\/blog\/research\/66719\/shellshock-and-its-early-adopters\/\" target=\"_blank\" rel=\"noopener\">Development<\/a>. <a href=\"https:\/\/securelist.com\/blog\/research\/66673\/bash-cve-2014-6271-vulnerability-qa-2\/\" target=\"_blank\" rel=\"noopener\">FAQ<\/a><\/p>\n<p><em>$ env \u2018x=() { :;}; echo vulnerable\u2019 \u2018BASH_FUNC_x()=() { :;}; echo vulnerable\u2019 bash -c \u201cecho test\u201d<\/em><\/p>\n<p>One more victim of creative naming (Shellshock sounds much more interesting than <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6271\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2014-6271<\/a>), this time: an extremely serious bug in Bash \u2013 the command-line shell for Unix-based operating systems. The second case \u2013 after the OpenSSL bug \u2013 when the question \u201cwhat systems are subject to it\u201d is answered with \u201call of them!\u201d Shellshock is exploited actively, the vulnerable systems search is very much <a href=\"https:\/\/threatpost.com\/shellshock-like-weakness-may-affect-windows\/108696\" target=\"_blank\" rel=\"noopener nofollow\">scalable<\/a>, and the admins of the affected servers have yet another chance to play the game of \u201chow to fix everything without breaking everything to shambles\u201d.<\/p>\n<p>In the wake of Heartbleed and Shellshock, we have received a lot of feedback from our clients, and we need to emphasize specifically how many issues small business experiences in this regard. A large company may assign considerable resources to search for the vulnerable nodes and fix them, while the smaller companies have either one IT specialist responsible for everything, or there\u2019s no \u201cadmin\u201d in the company altogether. So the typical question small business owners ask is \u201chow much of a threat is Bashbug\/Heartbleed\/whatever to my business?\u201d<\/p>\n<p>Not a trivial question. Is the in-office mail server, that was configured long ago and is \u201cworking okay\u201d, affected? How about the file server? Or what about the rented cloud infrastructure? A network router? What else? And what if the vendor\u2019s patch doesn\u2019t fix the flaw? The Bash vulnerability brought a lot of <a href=\"https:\/\/threatpost.com\/patching-bash-vulnerability-a-challenge-for-ics-scada\/108575\" target=\"_blank\" rel=\"noopener nofollow\">headache<\/a>s to critical infrastructure operators, which aren\u2019t easily updateable, yet on the other side there are thousands of smaller entities that all of sudden had to find their way through the unfriendly, confusing, and plain dangerous IT environment.<\/p>\n<p><strong>2. Heartbleed<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/seriousness-of-openssl-heartbleed-bug-sets-in\/105309\" target=\"_blank\" rel=\"noopener nofollow\">The story<\/a>. <a href=\"https:\/\/business.kaspersky.com\/cardiac-exsanguination-a-heartbleed-damage-round-up\/2006\" target=\"_blank\" rel=\"noopener nofollow\">Background<\/a>. <a href=\"https:\/\/threatpost.com\/what-have-we-learned-openssl-heartbleed-bug\/105385\" target=\"_blank\" rel=\"noopener nofollow\">Implications<\/a><\/p>\n<p>Can\u2019t describe the bug better than <a href=\"http:\/\/xkcd.com\/1354\/\" target=\"_blank\" rel=\"noopener nofollow\">XKCD<\/a> has done:<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/06\/06043347\/Untitled.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3504\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/06\/06043347\/Untitled.png\" alt=\"Untitled\" width=\"975\" height=\"348\"><\/a><\/p>\n<p>There were many debates: What is tougher \u2013 <a href=\"https:\/\/securelist.com\/blog\/research\/66673\/bash-cve-2014-6271-vulnerability-qa-2\/\" target=\"_blank\" rel=\"noopener\">Heartbleed or Shellshock<\/a>? On one side, Bash vulnerabilities allow for executing an arbitrary code, while OpenSSL bug only allows access to the data. On the other hand, Heartbleed\u2019s story drew much more interest \u2013 probably due to the total uncertainty at the time of publication. Who is affected? Who was attacked? Has the data been stolen, and if so, what kind? Who are the victims \u2013 Yahoo mail or online banking? Okay, we\u2019ve patched our servers, but have our contractors done so? Partners? Can we trust them with our data?<\/p>\n<p>Have I said before that the Web is broken?<\/p>\n<p><strong>1. Hiding a malicious code in PNG metadata<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/png-image-metadata-leading-to-iframe-injections\/104047\" target=\"_blank\" rel=\"noopener nofollow\">The news<\/a>. <a href=\"http:\/\/www.reddit.com\/r\/technology\/comments\/1x4ogo\/new_trojan_discovered_hidden_in_png_images\/\" target=\"_blank\" rel=\"noopener nofollow\">Reddit thread<\/a>.<\/p>\n<p>Er-r-r-rr, what?<\/p>\n<p>Well, that\u2019s an interesting method of attack. Upload an innocent PNG picture, pull out its metadata, find the bad code within. As a result, the visitor to an infected website is fed with an invisible iframe redirecting to another site, which is doing the attack. Just another method of obfuscating the malicious code doesn\u2019t make it a sensation yet it is the most visited Threatpost.com article in 2014.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>The most popular #cybersecurity story of the year proved to be about perception.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FpNu9&amp;text=The+most+popular+%23cybersecurity+story+of+the+year+proved+to+be+about+perception.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>How\u2019s that? Probably, thanks to the Reddit thread linked above. And, more importantly, the peculiar interpretation of the initial news piece \u2013 sort of like this: \u201cA zero day in PNG!!11 OMG!\u201d The possibility of getting hacked simply by downloading a picture is scary. Fortunately, this time they failed to completely break down the already broken Internet.<\/p>\n<p>So the most popular story of the year proved to be not about technology, but about perception. What happened to this news can be compared to the Sony Pictures Entertainment hack, which is discussed in cinema magazines while stripping away all of the technical details, but still provoking thinking on security in general. Cyberattacks are so common now that just another one won\u2019t draw much attention: vision has blurred and focus has shifted. Only the most apocalyptic news such as the Sony Hack, Shellshock, and \u201cinfect the world with a single png pic\u201d feel interesting. There were many of them in 2014, and this is bad. But, hopefully more companies will review their approach to security because of them. Which is good news.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are various ways to assess the threat landscape, but it&#8217;s what companies think of it that is most important. We decided to pick the top 10 events of 2014 by a single criterion: the popularity of the corresponding stories. And here is what we came up with.<\/p>\n","protected":false},"author":209,"featured_media":15786,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[282,2274,2145,588,838,2069],"class_list":{"0":"post-3497","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersecurity","10":"tag-cybersecurity-events-in-2014","11":"tag-epic-turla","12":"tag-heartbleed","13":"tag-shellshock","14":"tag-threat-landscape"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/an-outlandish-top-10-of-cybersecurity-events-in-2014\/3497\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/an-outlandish-top-10-of-cybersecurity-events-in-2014\/3497\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/an-outlandish-top-10-of-cybersecurity-events-in-2014\/3497\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3497"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3497\/revisions"}],"predecessor-version":[{"id":33437,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3497\/revisions\/33437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15786"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}