Websense's top six security threats

1. The "Cloud" will increasingly be used for malicious purposes

Cloud-based services, such as Amazon web Services (AWS), Microsoft Azure, and GoGrid, provide businesses and users with easy-to-use, rent-as-you go opportunities for storage and large-scale computing at a low cost. But these services also are an attractive target for cybercriminals and spammers to leverage for misuse. Websense predicts that in 2009 - we will see an increase in misuse of the "cloud." The cloud may be used simply to send spam or to launch more sophisticated attacks including hosting malicious code for downloads, uploading stats, and testing malicious code.

2. Increased malicious use of RIAs like Flash and Google Gears

There is growing adoption of browser-based web applications that are either replacing or being used alongside traditional desktop applications. Examples include web-based CRM systems, Google Docs and other web-based office tools. Creating a rich Internet experience through a browser-based application is created with technology called Rich Internet Applications (RIA). With the explosion of demand for these applications, for developers who use RIA technologies such as Google Gears, Air, Flash and Silverlight to build large web 2.0 internet applications, security is an afterthought, opening up the door for cyber criminal abuse. With RIA popularity exploding, we predict we will see some large scale attacks using both exploits found within the core RIA components as well as the user-created services that allow attackers to remotely execute code on user's machines.

3. Attackers take advantage of the programmable web

The web 2.0 world is one in which open web APIs, mashups, gadgets etc, allow web sites to share and use functionality from other web sites. web API's are being released at a record rate leaving little time for testing, and requiring a level of trust between users. websense believes that in 2009 - there will be a rise in the malicious use of some web service API's to exploit trust and steal user credentials and confidential information.

4. A web spam and malicious posting of content

The rise in the number and popularity of web sites that allow user-generated content will lead to a significant rise in web spam and malicious posting of content into blogs, user-forums, and social networks sites for search engine poisoning, spreading malicious lures, and duping users into fraud. Additionally, this threat will be augmented by several new web attack toolkits that have emerged that allow attackers to discover sites that allow posts and/or have vulnerabilities. Additionally more BOT's will add HTTP post functionality into their capabilities.

5. A distributed model of controlling botnets and hosting malcode

This year we saw two California-based hosting companies McCololo and Intercage/Atrivo shut down by upstream providers for hosting botnet command and control (C&C) servers as well as malicious code. Shutting down Mcolor prompted a 50% drop in all spam on the day it was shuttered. Shutting down Intercage/Atrivo had a similar effect as well as substantially preventing the "Storm" botnet from spreading. We predict that because these botnet groups have thus far depended on only a few providers to host their C&C servers, they will distribute their servers as well as move to foreign hosting providers, making it harder for upstream providers, the Internet community and law enforcement to find and shut them down.

 

6. A continued siege of "good" web sites

In 2009 we will see more than 80% of all malicious content hosted on sites with "good" reputations. We will see more big name web site compromises and more compromises of web sites in the Alexa top 100,000 most visited. This includes regional attacks on popular web sites in select properties, popular sporting sites, news sites, and continued placement of IFRAME's and other malicious redirection code within them.

Suggested Articles

Wireless operators can provide 5G services with spectrum bands both above and below 6 GHz—but that doesn't mean that all countries will let them.

Here are the stories we’re tracking today.

The 5G Mobile Network Architecture research project will implement two 5G use cases in real-world test beds.