Online voting, the London Summer Olympics and exploits of enterprise top the list of Internet Identity’s security concerns for 2012.
“Cyber criminals have gotten much smarter about capitalizing on current events to swindle victims. In this sense, cyber criminals are acting just as much like psychologists and pollsters as thieves,” said IID President and CTO Rod Rasmussen. “In 2012, there are several events that cybercriminals have had years to prepare for.”
The Tacoma-based company says the following are top enterprise security risks to watch out for during the coming year:
London Summer Olympics cyber attacks: Heading into the 2012 London Summer Olympics, cybercriminals will look to capitalize on the hype by tricking people with phishing scams impersonating the Summer Olympics official website and/or official Summer Olympics vendors.
Elections altered: With 2012 being a U.S. presidential election year and many U.S. states allowing military and overseas voting via the Internet, cybercriminals are expected to try and take advantage. The greatest areas of concern involve direct attacks on voting machines, which have been shown in numerous examples to be easily accomplished; hacking of vote tally databases; or hijacking the network infrastructure between them all.
12/21/2012 danger: Much has been said and speculated about the Mayan “end of times” of Dec. 21, 2012. Bank on the fact that cyber criminals will play into this fear through targeted phishing and malware attacks playing on people’s heightened awareness surrounding 12/21/2012.
Internet infrastructure attacks for financial gain: While hacktivism will persist, expect Domain Name System and Border Gateway Protocol attacks for financial gain to grab headlines. Indicative of this trend is the December 2010 DNS hijacking of large European payment processor ChronoPay in which cyber criminals collected at least 800 credit card numbers of its customers.
Physical infrastructure attacks carried out over the Internet: Expect to see real world infrastructure damage (power plants, utilities) and destruction of enterprises’ physical assets, both threatened and caused, by hacking. Expect the criminal world to take advantage of cyber security holes to create real-world damage too, as they have long used techniques like distributed denial-of-service attacks to extort money from victims.