Latest News  

Accenture Security Report identifies top cyber threats in 2017

Destructive ransomware, alternative crypto-currencies and increased use of deception tactics among threats driving even more lucrative criminal marketplace are among top cyber threats in 2017 identified by Accenture's latest report.

2017-08-29 19:35:33

With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, reveals how threat actors are continuing to evolve their ability to avoid detection. Based on in-depth analysis, the report anticipates a growth in the number of threat actors who are rapidly expanding their capabilities due to factors such as the proliferation of affordable, customizable and accessible tools and exploits.

The 2017 Cyber Threatscape Report examines key trends during the first half of 2017 and explores how cyber incidents may evolve over the next six months. This report relies on iDefense intelligence collection, research, and analysis including research using primary and secondary open-source materials. It covers the increased prevalence of destructive attacks and adversary denial and deception tactics; the aggressive use of information operations by nation-states; growth in the numbers and diversity of threat actors; as well as the greater availability of exploits, tools, encryption, and anonymous payment systems available to malicious actors.

"The first six months of 2017 have seen an evolution of ransomware producing more viral variants unleashed by potential state-sponsored actors and cybercriminals. Our findings confirm that a new bar has been set for cybersecurity teams across all industries to defend their assets in the coming months," said Josh Ray, managing director at Accenture Security. "While the occurrence of new cyber attack methods is not going away, there are immediate actions companies can take to better protect themselves against malicious ransomware and reduce the impact of security breaches."

Other notable observations from the report include:
• Reverse Deception Tactics – Increasing cybercriminal use of deception tactics including anti-analysis code, steganography, and expendable command-and-control servers used for concealment of stolen data. Greater public reporting on cyber threat activity and attribution may accelerate this denial and deception trend, increasing the cost of cyber defense efforts and resource allocations.
• Sophisticated Phishing Campaigns – Cybercriminals continue to craft familiar lures—subject lines mentioning invoices, shipping, resumes, wire transfers, missed payments— but ransomware is displacing banking trojans as one of the most prevalent types of malware delivered via phishing techniques
• Strategic Use of Information Operations – Escalation of espionage and disruption activity from state-sponsored actors may likely continue in response to fulfilling strategic collection requirements and geopolitical triggers such as economic sanctions, military exercises and religious conflicts.
• Alternative Crypto-Currencies – Bitcoin continues to be the currency of choice among cybercriminals, however, the need to better conceal transactions is forcing cybercriminals to either develop and leverage bitcoin laundering techniques or adopt alternative cryptocurrencies.
• DDoS-for-Hire Services – Distributed denial of service (DDoS)-for-hire services have given way to a thriving DDoS-for-hire botnet ecosystem leading to threat actors gaining greater access to increasingly potent and affordable DDoS-for-hire tools and services.
Effective components for a business continuity plan include:
• Adopt proactive prevention – Recognize phishing scams through prevention training and awareness programs. Make it easy for employees to report fraudulent e-mails quickly, and keep testing internally to prove the training is working.
• Elevate e-mail controls – Maintain strong spam filters and authentication. Scan incoming and outgoing e-mails to detect threats and filter executable files. Consider a cloud-based e-mail analytics solution.
• Insulate your infrastructure – Remove or limit local workstation admin rights or seek out the right configuration combinations (e.g. (virus scanners, firewalls). Regularly patch operating systems and applications.
• Plan for continuity – To avoid paying any ransom have a strong cyber resilience plan for recovery that is regularly reviewed, updated, and tested.

About Accenture

Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions – underpinned by the world's largest delivery network – Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With more than 411,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com.

Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organizations' valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown.


0 COMMENTS ^ Go back to Top
WRITE A COMMENT ^ Go back to Top
 
Your email address will not be published.
Nickname
Email
Comment
Validation Code
   
 
 
NEWS
Accenture pledges thousands of hours to bring coding to students

Accenture employees across 56 countries have pledged to complete more than 10,000 Hours of Code and lead coding tutorial sessions around the world during Computer Science Education Week, Dec. 4-10, as part of t

 Read Full article »
CTP was nominated in four categories at the CIJ Awards Gala 2017

CTP, the leading premium industrial parks developer and long-term manager in Romania and Central and Eastern Europe, was nominated in four categories at the tenth edition of CIJ Awards Gala, which will take pla

 Read Full article »
How does leadership look today?

This summer, Outsourcing Today organized LEARNING & DEVELOPMENT Roundtable at InterContinental Hotel in Bucharest. The event brought together the business services professionals to discuss and discover new tool

 Read Full article »
Ericsson names new Romania country manager

Swedish telecom equipment maker Ericsson named Dragos Mircea Rebegea as new country manager for Romania.

 Read Full article »
Workplace – Building new approaches

The real estate market in Romania is living the wobbly times, in consonance with everything that is happening in Romania. The growing Euro rate and the instability and unpredictable times make of Romanian consu

 Read Full article »
Embracing limitless learning

The growth of any business relies on the development of its own people that consists it. That is no wonder that, in an industry such as outsourcing and IT that learns together with its shareholders how to adjus

 Read Full article »
CTP: Approximately 150 high school students participated in the first phase of a project dedicated to supporting the workforce market

CTP, the leading premium industrial parks developer and long-term manager in Romania and Central and Eastern Europe, finalizes first phase of social responsibility program dedicated to the workforce market from

 Read Full article »
Intel opens its center in the second office building within Openville Timisoara

Starting this December, the United Business Center 1 (UBC 1) class A office building within the Openville development will accommodate the Timişoara-based software research and development center of the Intel

 Read Full article »
Bitdefender relocates production of BOX security device from China to Satu Mare

Bitdefender, one of the world's largest security solutions companies with Romanian roots, has moved the production of Box security device from China to Satu-Mare and said it is preparing the launch of its secon

 Read Full article »
Preparing for the new future

Business shared services in Romania is by nature a flexible, mobile and diverse community and in this context, local markets develop their own particularities to address the global changes, to adjust to new dem

 Read Full article »
 
 
MOST READ ARTICLES
» ROMANIAN OUTSOURCING AWARDS FOR EXCELL...
» Molson Coors started to grow its busin...
» Roxana Tesiu appointed as the new Vice...
» Gartner: Romania moved into the first ...
» ABSL: BRD First Tech challenge in Roma...
» Manpower:Romania has world's third hig...
» Healthcare IT outsourcing market is ex...
» Exclusive OT print issue: Genpact may ...
» Vastint Romania celebrated the opening...
» ManpowerGroup launches ManpowerGroup S...
 
EDITOR CHOICE
TELUS International: How customer service significantly improves with diversity in the workplace

Discover how cultivating a diverse workforce helps companies enhance their brand, attract top talent and deliver exceptional customer service

 Read Full article »
Committed to growth

In the current swelling race of reaching the perfect algorithm for growth, companies operating various outsourcing services in Romania all relate to the main key drivers for business development in which people

 Read Full article »
Shifting the workplace perspective towards high-end added value

This month, OUTSOURCING TODAY organized The Workplace of the future in IT and Outsourcing at Caro Hotel Bucharest, a new concept event meant to connect fast-growing corporate tenants from IT and outsourcing ind

 Read Full article »
Andrei Romanescu, Managing Director of Veeam Romania: Outsourcing sector, a decade evolution

Since the early 2000s, this sector has grown at a significant rate (about 20-30% per year). The industry has evolved from focusing on cost and labour arbitrage to adding value – therefore the growth is not so

 Read Full article »
TELUS International Europe: Discover how successful smart-home providers deliver exceptional customer service

Key Takeaways

• Internet of Things (IoT) connected home devices are making the contact center and customer service more important than ever. • A friendly approach and positive attitude are import

 Read Full article »
Latest News  
 
about us | newsletter | contact | members area
Copyright © 2015 by Diplomat Media Events Design by Diplomat Media Events