{"id":4938,"date":"2015-12-15T21:09:14","date_gmt":"2015-12-15T21:09:14","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4938"},"modified":"2019-11-15T07:00:12","modified_gmt":"2019-11-15T12:00:12","slug":"year-2015","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/year-2015\/4938\/","title":{"rendered":"Year 2015: And so what was it like?"},"content":{"rendered":"<p>2015 is fading away and Christmas is now just ten days away. Securelist shared its <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/72886\/kaspersky-security-bulletin-2015-top-security-stories\/\" target=\"_blank\" rel=\"noopener\">Top Security Stories<\/a> rating last week, and we have our own list to share, though it\u2019s a bit different. Instead of picking a handful of top stories, we took a look at cybersecurity in 2015 in general. So, 2015 was the year when\u2026<\/p>\n<p><strong>\u2026APTs threw the Jolly Roger<\/strong><\/p>\n<p>Early this year, Carbanak was announced, the first ever purely criminal APT campaign which cost banks worldwide a formidable sum \u2013 around $1 billion, according to early estimates.<\/p>\n<p>The full story is available <a href=\"https:\/\/business.kaspersky.com\/the-great-bank-robbery-carbanak-apt\/3598\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>This was a rather sophisticated campaign targeting banks. Attackers used an array of tools, including the manual recon. Spearphishing letters were used to deploy Carberp-based backdoors into the victims\u2019 systems, then attackers started looking for relevant PCs they could use to get to the points where money could be actually extracted. ATMs were then instructed remotely to dispense cash without any interaction with the ATM itself, with the cash then collected by \u201cmules\u201d. Otherwise the SWIFT network was used to transfer money out of the organization and into criminals\u2019 accounts.<\/p>\n<p>The campaign is apparently still active as of the end of 2015: new versions of Carbanak-associated malware were detected as late as <a href=\"https:\/\/business.kaspersky.com\/carbanak-evolved-new-versions-are-detected\/4539\/\" target=\"_blank\" rel=\"noopener nofollow\">in September<\/a>.<br>\nAPTs were mostly associated with nation states previously, so that Securelist\u2019s own Targeted Cyberattacks Logbook pictures them as battleships. With Carbanak proving to be just about thievery with nothing but cash-loving criminals behind it, it\u2019s really like a ship under the black flag.<\/p>\n<p><strong>\u2026Spies went after smaller players<\/strong><\/p>\n<p>Grabit was another head-turner this year: the first cyberespionage campaign targeting SMBs. Attackers were predicted to switch to \u201csofter targets\u201d previously. On the surface: every large enterprise has a large array of lesser suppliers, and while mainstay has possibly impenetrable cyberdefenses, satellites are not necessarily that well-protected. So the strategically-important data may be extracted indirectly, possibly with even less effort than in a case of a direct attack.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4018\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020424\/wide.png\" alt=\"wide\" width=\"1000\" height=\"667\"><\/p>\n<p>More details are available <a href=\"https:\/\/business.kaspersky.com\/grabit-an-smb-targeting-spy-campaign\/4015\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p><strong>\u2026Two APT actors vampired each other<\/strong><\/p>\n<p>A pretty story publicized mainly by Securelist: While studying Naikon, one of the most active APT groups in Asia, Kaspersky Lab researchers stumbled upon yet another threat actor. Its codename \u2013 Hellsing \u2013 is derived from the famous Japanese manga about vampire-battling organization employing a (somewhat) redeemed vampire.<\/p>\n<p>The funny thing is that Hellsing has been attacking Naikon. That\u2019s, however, where the fun ends, as both APT campaigns are serious business. Read more about them <a href=\"https:\/\/securelist.com\/analysis\/publications\/69567\/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4942\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020424\/vampire.jpg\" alt=\"vampire\" width=\"1000\" height=\"667\"><\/p>\n<p>A Russian-speaking APT group, Turla, was\u00a0discovered hiding its C&amp;C servers in space. Or, to be more specific, it used satellite communications to hide tracks and infect its victims.<\/p>\n<p>They\u2019d been hiding well, but not well enough not to be discovered. The original stories are available <a href=\"https:\/\/business.kaspersky.com\/satellite-turla\/4515\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>\u00a0and <a href=\"https:\/\/securelist.com\/blog\/research\/72081\/satellite-turla-apt-command-and-control-in-the-sky\/\" target=\"_blank\" rel=\"noopener\">here<\/a>, both are really worth reading.<\/p>\n<p>Years ago it seemed that Stuxnet was the first real cyberweapon that opened Pandora\u2019s box. Now it\u2019s clear it wasn\u2019t the first.<\/p>\n<p>In February, Kaspersky Lab announced discovery of Equation APT, a massive, decades-long cyberespionage framework. Some of its C&amp;Cs have been registered as early as 1996, although the main one dates back to August 2001.<\/p>\n<p>Its main weapon \u2013 Fanny worm \u2013 was first reported in 2008; it used the same zeroday exploits Stuxnet used\u00a0two years later. Kaspersky Lab experts stated that Equation had been interacting with other powerful groups such as Flame and Stuxnet. It is possible that Equation is actually the \u201cmothership\u201d of multiple APTs \u2013 if not <a href=\"https:\/\/business.kaspersky.com\/mothership-unlocked-the-equation-apt\/3608\/\" target=\"_blank\" rel=\"noopener nofollow\">a direct ancestor of theirs<\/a>.<\/p>\n<p><strong>\u2026Windows 10 arrived<\/strong><\/p>\n<p>While still trying to get rid of antique Windows XP, Microsoft served out its new OS, giving it away for free to the users of Windows 7 and 8.1.<\/p>\n<p>Arriving in late July, Windows 10 brought in a number of <a href=\"https:\/\/business.kaspersky.com\/windows-10-promised-security-improvements\/4085\/\" target=\"_blank\" rel=\"noopener nofollow\">security improvements<\/a>\u00a0as well as (the quite usual) controversy, especially regarding its users\u2019 data and control over it. There is a thing or two to be worried about \u2013 Windows 10 really needs a thoughtful approach to\u00a0<a href=\"https:\/\/business.kaspersky.com\/windows-10-data-control\/4318\/\" target=\"_blank\" rel=\"noopener nofollow\">retain control over sensitive data<\/a>.<\/p>\n<div id=\"attachment_4321\" style=\"width: 950px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-4321\" class=\"size-full wp-image-4321\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020423\/cortana.jpg\" alt=\"An apparition from Windows \" width=\"940\" height=\"520\"><p id=\"caption-attachment-4321\" class=\"wp-caption-text\">An apparition from Windows<\/p><\/div>\n<p>On the brighter (perhaps) side, Microsoft adopted a more rigorous than ever approach to delivering the updates: the Home and Pro editions are automatically receiving all non-critical updates as they are released without the possibility of declining them, in addition to automatic driver updates. Pro versions are able to defer updates for a limited time, but <a href=\"https:\/\/business.kaspersky.com\/microsoft-updates\/4305\/\" target=\"_blank\" rel=\"noopener nofollow\">not ignore them completely<\/a>.<\/p>\n<p>Microsoft was also quick to drop <a href=\"https:\/\/business.kaspersky.com\/windows-10-patch\/4326\/\" target=\"_blank\" rel=\"noopener nofollow\">a behemoth patch<\/a> for the flaws discovered by early adopters. The patch arrived just a day after the official Windows 10 release date, which certainly generated lots of buzz\u2026 but would it be better without this update?<\/p>\n<p><strong>\u2026The cars finally got hacked remotely<\/strong><\/p>\n<p>It was much feared before, and finally became a grim reality: car\u2019s onboard systems were hacked so badly that the brakes, transmission, steering and dashboard functions could be \u201cedited\u201d from across the country \u2013 via WiFi.<\/p>\n<p>As shown by two seasoned car-hackers \u2013 Charlie Miller and Chris Valasek \u2013 Chrysler\u2019s Jeep Cherokee onboard infotainment system is _not_ isolated from the critical dashboard functions, so that attackers can get a hold on the latter. It is an elementary sort of mistake, which shows that the venerable automaker seems to have saved big on very basic information security expertise.<\/p>\n<p><a href=\"https:\/\/business.kaspersky.com\/hacking-my-car-remotely-this-time\/4295\/\" target=\"_blank\" rel=\"noopener nofollow\">Here\u2019s the story in full<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4943\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020423\/jeep.jpg\" alt=\"jeep\" width=\"1000\" height=\"727\"><br>\n<strong>\u2026Major ransomware campaigns and botnets were taken down (mostly)<\/strong><\/p>\n<p>While new threats get discovered all the time, law enforcement agencies together with private sector cybersecurity companies are tracking the perpetrators, and from time to time taking down the botnets and getting the crooks jailed.<\/p>\n<p>In the first half of 2015, Simda botnet was taken off the board, with 14 C&amp;C servers in the Netherlands, USA, Luxembourg, Poland, and Russia taken down at once. Preliminary analysis of some of the sinkholed server logs revealed a list of 190 countries <a href=\"https:\/\/business.kaspersky.com\/simda-botnet-a-stealthy-malware-waiter\/3831\/\" target=\"_blank\" rel=\"noopener nofollow\">affected by the Simda botnet<\/a>.<\/p>\n<p>It <a href=\"https:\/\/business.kaspersky.com\/simda-post-mortem-or-why-security-is-everybodys-business\/3975\/\" target=\"_blank\" rel=\"noopener nofollow\">stayed below the radar for a disturbingly long period<\/a>, too long for a large botnet \u2013 an invisible elephant, as it is.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4940\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020422\/elephant.jpg\" alt=\"elephant\" width=\"1000\" height=\"685\"><\/p>\n<p>It also has been a \u201cdistribution platform\u201d for other malware, which made it even more dangerous.<\/p>\n<p>In September, a couple of young Dutch individuals were arrested on suspicion of involvement in CoinVault ransomware attacks. The same individuals had been developing yet another ransomware \u2013 BitCryptor. Both ransomware campaigns have now,\u00a0essentially, stopped.<\/p>\n<p>In Autumn, a botnet behind Dridex \u2013 a sophisticated banking malware stealing credentials of online bank accounts worldwide \u2013 mostly went dark after police in Cyprus apprehended a Moldovan individual suspected in creation of this botnet.<\/p>\n<p>The <a href=\"https:\/\/business.kaspersky.com\/dridex-down\/4658\/\" target=\"_blank\" rel=\"noopener nofollow\">full story<\/a> is available here.<\/p>\n<p>A large ransomware campaign linked to a notorious Angler exploit kit had been dismantled, bringing the kit\u2019s activity down 50%. Unfortunately, not entirely, as it seems to be alive as of now, <a href=\"https:\/\/twitter.com\/kaspersky\/status\/676709674700431364\" target=\"_blank\" rel=\"noopener nofollow\">serving CryptoWall to its victims<\/a>.<\/p>\n<p>Criminals go to great lengths to keep their tools of the trade afloat, so it will take time to bring Angler down completely.<\/p>\n<p><strong>\u2026FBI told to pay the ransom<\/strong><\/p>\n<p>It was a not-so-mild scandal when a high-ranking FBI representative acknowledged his agency often recommended that ransomware victims pay the ransom if the data was critically important and there were no backups.<\/p>\n<p>As \u201cdisquieting\u201d as it was, this message was actually very fair: some strains of ransomware are uncrackable as of now, since they use strong encryption algorithms. So, unless the FBI or some other LEA apprehend the Crypto-something authors and pry the decryption keys from them, there\u2019s no way to decrypt the affected files. Even a supercomputer will take eons to crack RSA 2048 bit key of CryptoWall 3, for instance.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4660\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020421\/main5.jpg\" alt=\"main\" width=\"1000\" height=\"667\"><\/p>\n<p>The only way here is to have all appropriate precautions in place \u2013 mainly backing up files regularly in the unpowered data storage.<\/p>\n<p>The full story is available <a href=\"https:\/\/business.kaspersky.com\/paying-up-or-not\/4733\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p><strong>\u2026Many predictions came true<\/strong><\/p>\n<p>In late 2014, Securelist published predictions for how the world of cyber threats may evolve in 2015. Four of the nine predictions we made were directly connected with threats to businesses, and most of the predictions proved accurate \u2013 three of the four business-related threats have already been fulfilled.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4944\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020421\/ball.jpg\" alt=\"ball\" width=\"1000\" height=\"668\"><\/p>\n<p>Cybercriminals embraced APT tactics for targeted attacks;\u00a0APT groups fragmented and diversified attacks; ATM and PoS attacks escalated indeed. The only miss is \u201cattacks against virtual payment systems\u201d \u2013 and it\u2019s good when the bad predictions don\u2019t come true. But most of them, again, did.<\/p>\n<p>Will the cybersecurity situation in the world improve next year, with all of the ongoing turmoil? It\u2019s hard to say, but what 2015 has definitely proved is that cybersecurity is the thing that\u2019s relatable to everyone, from housekeepers and self-employed individuals to large enterprises and governments. It\u2019s up to everyone to make the cyberworld a better place.<\/p>\n<p>And Kaspersky Lab is here to help ;)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We take a look at what happened in cybersecurity throughout 2015. <\/p>\n","protected":false},"author":209,"featured_media":15501,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2367,282,2368],"class_list":{"0":"post-4938","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-2367","10":"tag-cybersecurity","11":"tag-top-stories"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/year-2015\/4938\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/year-2015\/4938\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/year-2015\/4938\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/2015\/","name":"2015"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4938"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4938\/revisions"}],"predecessor-version":[{"id":30355,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4938\/revisions\/30355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15501"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}