2013 CHECK POINT ANNUAL SECURITY REPORT
02
THREATS TO YOUR
ORGANIZAT ION
BLACKHOLE
AN EXPLOI T KI T FOR THE MASSES
Part of the huge increase inmalicious activity in the last
year can be attributed to hackers easily using pre-made
attack tools and packages. With one click, anyone can
download a full-fledged, highly sophisticated attack
suite. One such suite is the BlackHole exploit kit - a
widely-used, web-based software package. BlackHole
includes a collection of tools that take advantage of
security holes in web browsers to download viruses,
bots, trojans and other forms of malicious software
agents to computers of unsuspecting victims. Prices
for these kits range from $50 for one day usage, up to
$1,500 for a full year
9
.
funded, have motivations and goals. Cybercriminals
seem to dedicate considerable amount of time and
resources to gather intelligence. Their criminal activities
cause organizations severe damages, such as: loss of
confidential data, business interruptions, reputation
damages and of course financial loss. The most
sophisticated and long-term attacks, working towards
a very specific pre-determined goal, are referred to as
Advanced Persistent Threats (APT). These attacks are
unlikely to be detected by traditional security systems,
placing governments, enterprises, small businesses and
even personal networks at risk.
Breaking News:
A New Cyber-Attack is Exposed
In 2012, cyber-attacks continued to proliferate and make
headlines. Almost daily malicious software threats, attacks
and botnets are front-page news, displaying the infamous
success of hackers stealing data, paralyzing operations, and
spying on corporations and governments. The following
examples are only the tip of the iceberg of cyber-attacks
that have occurred during 2012: Hackers attacking the
White House network
6
, Hactivist group Anonymous
brought down the websites of trade groups U.S. Telecom
Association and TechAmerica
7
, Cyber-Attacks hits on
Capital One Financial Corp., BB&T Corp., and HSBC
Bank USA
8
, and many others.
Advanced Persistent Threats
Cybercriminals are no longer isolated amateurs. In
many cases cybercriminals belong to well-structured
organizations that resemble terrorist cells - they are well-
“THERE ARE ONLY TWO TYPES
OF COMPANIES, THOSE THAT
HAVE BEEN HACKED AND THOSE
THAT WILL BE.”
Robert Mueller, Director, FBI, March, 2012
5
1,2,3,4 6,7,8,9,10,11,12,13,14,15,...50