What are we on the lookout for?

Dave Kennedy
January 7th, 2009

A number of organizations take the end of the year as an opportunity to publish predictions about what will happen in the security space during the subsequent year. The RISK Team engages in that exercise every Thursday as part of our weekly Risk call, during which we analyze emerging threats and vulnerabilities. So instead of generating a new list, we’ll share one that was refined over the course of 50 weekly meetings. In addition, we’ll share our predictions from the prior five years.

The question posed to the team every week is “What are we on the lookout for?”. Our answers are not so much predictions of what will happen, but what we’re concerned could happen based on current trends. The following items resulted from our final discussion of 2008:

  • Christmas-related hoaxes, e-cards, and malware (not too hard, they happen every year)
  • Exploits favoring business systems, especially ActiveX installed within enterprise
    vs. “Mom & Pop shops”
  • Economic crisis moves e-tailers to collect more PII (and protect it)
  • E-tailer bankruptcies result in failure to deliver to consumers and reduced
    consumer trust in e-tailers
  • New vulnerabilities in Windows OS components previously patched,
    e.g. netapi32.dll MS06-040 and MS08-067
  • Vulnerability disclosure and exploits in MS Office documents
  • Increased exploitation of web sites or web applications that offer up
    third-party supplied content that can be scripted or include code that
    executes on the visitor’s system
  • Barnacle ware: Bundled and helper software and utilities; software that is installed by the OEM or is picked up through routine usage but is not supported (e.g., optical drive software, media management, image viewers, and browser plug-ins)

2007

  • Increased incidents of reputation attacks (Human Factors)
  • Increased JavaScript Exploits
  • Increased IPv6 vulnerability chatter
  • Vulnerability disclosure and exploits in MS Office documents
  • Increased exploitation of web sites or web applications the offer up
    third-party supplied content that can be scripted or include code that
    executes on the visitor’s system
  • Barnacleware: Bundled and Helper software and utilities. Software that
    is installed by the OEM or is picked up through routine usage but is not
    supported. Examples: optical drive software, media management, image
    viewers, and browser plug-ins
  • Fourth-age worm attack

2006

  • Al Qaeda DoS attacks on financial sector
  • MS06-070 malcode and bots
  • Attacks using targeted Trojans
  • SQL attacks (especially through unpatched Oracle vulnerabilities)
  • Vista malware hype, reports of Vista-specific malware/exploits

2005

  • Attacks using customized Trojans
  • Innovative phishing using domain name IDN or DNS manipulation
  • SQL attacks (especially through unpatched Oracle vulnerabilities)
  • Malcode exploiting Microsoft Word buffer overflow
  • Christmas-related scams and phishing
  • Exchange administrator being exploited via bounced emails

2004

  • Malware that gets legs
  • SSH
  • Something under the radar in the Linux world (elf, game, bot?)

2003

  • Microsoft Messenger Service (net bios) worm
  • Attacks exploiting vulnerabilities patched by MS03-049
  • Malcode hiding using alternate data streams

Tags: , , , , , , , , , , , , , ,

Leave a Comment