Cyber-Threats in 2016
Here’s Where the Danger Lurks

Cyber-Threats in 2016: Here’s Where The Danger Lurks

  • Blog Editorial Team
  • Managed Security
  • IT-Security, Ransomware, Portfolio Management, IoT, Cyber-Threats

Banks, companies, governments and private individuals – they were all affected by cyber-threats in 2016. The DDoS attacks unleashed on devices belonging to the Internet of Things were particularly concerning. The attacks on the website of the journalist Brian Krebs at 620 Gigabit per second, on OHM at one Terabit per second and on Dyn at 1.2 Terabit per second were new records. In this article, we sum up the biggest cyber-threats of 2016 and explains what we can learn from them for 2017.

DDoS attacks

DDoS attacks were among the top cyber-threats in 2016. A DDoS attack means that one component in a data network (e.g. the server) becomes overloaded and therefore blocks the whole system. This is what denial of service means. If a larger number of systems cause the overload, it can frequently indicate that an attack is ongoing, which is called a distributed denial of service (DDoS). But the record DDoS attack on the DNS provider Dyn allowed conclusions to be drawn. It appears that the attackers linked devices belonging to the Internet of Things to produce a botnet. This huge network of "slave" devices such as IP cameras, baby monitors, refrigerators and coffee machines – all of them hooked up to the Internet and each with their own significant security vulnerabilities – allowed the hackers to seize almost unimaginable resources. This was enough to take down Dyn, and with it even prestigious companies like Amazon, Airbnb or PayPal. Supposedly, the hacktivist groups Anonymous and New World Hackers used the attack as revenge for the Internet exile of WikiLeaks founder Julian  Assange. Soon afterwards, the following message was posted on the WikiLeaks Twitter account: "Mr. Assange is still alive and WikiLeaks is still publishing. We ask supporters to stop taking down the US internet. You proved your point."

Internet of Things

Release of the malware Mirai at the start of October took the spiraling threat posed by attacks to a new level. This software aims to scan devices belonging to the Internet of Things to detect weak passwords and to incorporate the devices in a botnet. The risks posed by security vulnerabilities of simple devices were neglected for a long time. For instance, Verizon wrote in its 2015 Data Breach Investigation Report: “Don’t waste your time worrying about mobile and IoT when it comes to data protection priorities.” Verizon claimed that malware is more prevalent on other platforms than mobile devices, and that the focus should be placed on the at-risk areas. Moreover, the reports concentrate mainly on companies that are looking to protect their data. But what can consumers do if their coffee machine brews a hot beverage at 7 am, the fridge asks about milk supplies at 7:10 am, and they then join forces five minutes later to unleash a corporate attack? Might companies therefore be exposed to the risks lurking in the IoT devices? Yes! The Federal Office for Information Security in Germany (BSI) warned in its report The State of IT Security Germany 2016, released at the start of November, that IoT devices could indeed be manipulated in botnet attacks.

Routers

An attack at the end of November took down almost a million routers in Germany. A breach in the security protocol was exploited to load malware onto the routers. Later on, experts assessed the attack to be quite shoddily executed, as it failed to achieve its actual goal. The purpose had been to draw the routers into a botnet so that they could be used in future attacks. But the problem was solved merely by restarting the affected devices. Nevertheless, several German politicians used the attack to call for new legislation, demanding that the industrial sector show a greater appreciation of responsibility and quality in the development of its software. The import of cheap and poorly programmed technology from China was also criticized. Interior Minister Thomas de Maizière proposed setting up a “rapid response team”, while Telekom CEO Timotheus Höttges suggested upping the ante by creating a "Cyber NATO".

Android Devices

The future goals of the black hat hacker community are clear, namely to enslave as many devices as possible. There are now fears, especially since the "Trident" vulnerability was discovered in iOS devices, that a similar weakness could also be identified in their Android counterparts. The malware Pegasus teams up with Trident to sniff out high-target devices and is able to export everything from calls and e-mails to encrypted app data. It would be fatal if hackers were to acquire similar capabilities for Android devices. Over 1.4 billion devices worldwide use Android. Unauthorized access to even a fraction of this number would allow hackers to carry out DDoS attacks at over 30 terabits per second. What’s more, DDoS attacks could even be expanded to target mobile network providers. Companies urgently need to draw up emergency plans for similar situations and to ensure they are adequately protected.

At a glance

To show you why IT security is such a big issue, we summarized the biggest cyber-attacks of 2016 and their outcome:

Top 5 cyber attacks 2016
Top 5 Cyber-Attacks in 2016, source:  SoftwareONE

Protect your IT against Cyber-Attacks!

Let us have a look at your security infrastructure to secure your company and protect it from considerable losses. You are looking for someone having a profound knowledge of all technologies of the major IT security vendors? Contact our Managed Security team to find the security solution and to  be prepared for the upcoming cyber-threats!

Read more
  • Friday 10 February 2017

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

SoftwareONE Blog Team

Blog Editorial Team Trend Scouts

IT Trends and industry-relevant Novelties

Related Articles

security-compliance-at-the-boardroom-table
  • 03 May 2019
  • Mike Fitzgerald
  • Managed Security
  • IT-Security, Compliance, Cyber-Crime, Cyber-Threats, Cyber-Attacks

Security & Compliance - Why They Have a Permanent Seat at the Boardroom Table

In his recent byline in “Corporate Compliance Insights”, Mike Fitzgerald shared the top three reasons why a security-first mentality is crucial to the success of your business.

Azure-Sentinel_Posting
  • 17 April 2019
  • Chris Allen
  • Managed Cloud, Publisher Advisory, Managed Security
  • Azure, Azure Sentinel

The ‘All-Seeing’ Azure Sentinel - Provides Omnipresent Level Security

Microsoft Azure Sentinel provides intelligent, cloud-scale security analytics across your entire enterprise. Our expert Chris Allen explains how it works and what it has to do with Lord of the Rings

Managed-Security---Ahead-of-Security-Threats
  • 23 October 2018
  • Blog Editorial Team
  • Managed Security
  • IT-Security, Cyber-Attacks, Cyber-Crime, Cyber-Threats

Stay Ahead of Security Threats: Focusing on Your High-Risk Assets

As you move forward, staying ahead of security threats will require a strong, but flexible, plan. Read more about how you can create a course of action for prevention and remediation.