Skip to main content

Ransomware, mobile payments will be 2016’s most severe security threats

exploit
Image used with permission by copyright holder
This has been a banner year for cybercrime, from Ashley Madison to the Office of Personnel Management to the recent VTech hack, and 2016 doesn’t look like things are going to get easier. According to several cybersecurity experts and companies, threats and vulnerabilities will continue to evolve in 2016.

Ransomware really came of age in 2015, and it will likely continue to grow as more and more new versions emerge, claims T.K Keanini, CTO of security company Lancope.

Kaspersky Lab reports that ransomware attacks doubled in 2015 while Symantec this week noted that there has been significant uptick in TeslaCrypt (one of the most prolific incarnations of ransomeware) infections. This comes several months after McAfee Treat Labs stated that ransomware grew some 165 percent in the first quarter of 2015 alone, thanks mainly to a number of new strains of the malware popping up online.

According to Trend Micro’s predictions report, 2016 will be the year of online extortion. Psychology and fear, its report claims, will form the backbone of the threat. “Reputation is everything, and threats that can ruin an individual’s or a business’ reputation will prove to be effective and—more importantly—lucrative,” the authors write.

We’ve already seen cases of this. Typically ransomware locks down a user’s system and demands a ransom to de-crypt the data. Now attacks are becoming more targeted, whether it’s gamers, or users of digital wallets.

The burgeoning market for mobile payments will also attract greater efforts from cybercriminals, according to Steve Lowing, director of product management at Promisec. “It feels like a new attack comes out on Android-based phones every week, since it is the dominant device. Apple Pay is increasing market share, and almost everyone has a mobile phone as opposed to a laptop,” he said.

This growing market share for mobile payments, which now includes another major player in Samsung, will open up new potential attack vectors. Just last month Bluebox Security examined 10 Android and iOS payment apps, concluding that their security is “still very much in its infancy.” It found that many apps put consumer data at risk, or even have flaws that could allow for the re-routing of money. The study, however, doesn’t specify the vulnerabilities present in each app.

The app stores will also have their work cut out for them. This year, the usually safe Apple App Store was compromised with a number of apps infected by the XcodeGhost malware. The Google Play Store, by its open nature, has been riddled with fraudulent apps in the past too.

Finally, access to cybercrime tools is becoming more of a worry. The “democratization” of cheaply available hacking tools for amateurs will grow, said Javier Vargas, research manager fraud prevention firm, Easy Solutions.

“We’ve witnessed the outbreak of malware code and hacking tool leaks, as well as an increased amount of public repositories of tools potentially exploitable for criminal activity – and we expect this to grow substantially throughout 2016 and beyond.”

Editors' Recommendations

Jonathan Keane
Former Digital Trends Contributor
Jonathan is a freelance technology journalist living in Dublin, Ireland. He's previously written for publications and sites…
How to draw on Google Docs to add doodles, sketches, and more
The Google Play Store, YouTube, and Google Docs installed on an Amazon Fire Max 11.

Word processing software isn’t the kind of tool that most users would consider exciting, which is why we’re glad to see companies like Google adding a little flair to its own products. We’re talking about Google Docs, a free-to-use word processor that’s part of your larger Google Account ecosystem. Basic formatting options and other familiar word processing functions are front and center on Google Docs, but the ability to add doodles, sketches, and other entertaining media to your next Docs file requires a special bit of know-how.

Read more
AMD’s upcoming APUs might destroy your GPU
AMD CEO Lisa Su holding an APU chip.

The spec sheets for AMD's upcoming APU lineups, dubbed Strix Point and Strix Halo, have just been leaked, and it's safe to say that they're looking pretty impressive. Equipped with Zen 5 cores, the new APUs will find their way to laptops that are meant to be on the thinner side, but their performance might rival that of some of the best budget graphics cards -- and that's without having a discrete GPU.

While AMD hasn't unveiled Strix Point (STX) and Strix Halo (STX Halo) specs just yet, they were leaked by HKEPC and then shared by VideoCardz. The sheet goes over the maximum specs for each APU lineup, the first of which, Strix Point, is rumored to launch this year. Strix Halo, said to be significantly more powerful, is currently slated for a 2025 release.

Read more
Hyte made me fall in love with my gaming PC all over again
A PC built with the Hyte Nexus Link ecosystem.

I've never seen anything quite like Hyte's new Nexus Link ecosystem. Corsair has its iCue Link system, and Lian Li has its magnetic Uni system, and all three companies are now offering ways to tie together your PC cooling and lighting devoid of extraneous cables. But Hyte's marriage of hardware, software, and accessories is in a league of its own -- and it transformed my PC build completely.

I've been using some of the foundational components of the ecosystem for about a week, retailoring a build inside of Hyte's own Y40 PC case to see how the system works. It doesn't seem too exciting at first -- Hyte released an all-in-one (AIO) liquid cooler, some fans, and a few RGB strips, who cares? But as I engaged more with the Nexus Link ecosystem, I only became more impressed.
It all starts with the cooler

Read more