One of the forms of malicious attacks in 2013 were professionals
One of the forms of the most dangerous attack in 2013 is the security expert evaluation is intentional attack, the malicious code "lying" is designed exclusively for "prey".
Designed specifically for those "VIP"
Current Internet environment is complicated for various types of equipment involved are able to access the network and provide higher mobility. Hence, boundary protection systems should also not clear. Meanwhile, the number of new malicious code increased dramatically. If last year only 3,000 Android applications infection risks and increased 129,000 in December 12/2012. Trend Micro expects to end this year, this figure will surpass 1 million Android apps hazards.
According to Khoi Ngo Vietnam, Country Director, Vietnam and Cambodia TrendMicro, one tends to take information security best 2013 APT attacks. This type of attack will not spread unless the public sector, the engine may be financial or even political.
APT attack is a form of attack is very dangerous. We intentionally offensive, attacking a durable, attack all the way to an object that contains data. After the attack on the system, we have a lot of different tricks to steal data, pushed out to external objects. The approach taken by this type of attack is quite simple. The first is to take every flaw in the software, the system of the object of attack. The latter uses the solution approach "prey" safely, most gentle, he shared Restore Security World 2013 Conference in the morning 26/3.
For example, if you want a computer attack on senior leadership for this machine contains critical data, hackers will target environmental surveillance activities of the Secretary of leaders (such as facebook, websites or access). Through this environment, hackers will hit up the link offered, she just click on one of these links is also no damage happens immediately that only one malware (malicious code) is the machine. Malware will automatically send email to the leaders and just opened the email only malware will continue to remain the leader of this machine. Even malware "lying" on the system can connect to, draw diagrams and networks of objects quietly pushing out information.
This is also the way in which spyware, backdoor done in the past. They silently "his brother" in the user's system but they did not know. Initially they do not harm the system but updated object information via hackers. Most people who hold important data are being attacked in the past, Colonel Tran Van Hoa, deputy director, specifically fight against high-tech crime, the Police Department Crime Prevention, Ministry Police identified.
According to Hoa, network attacks in Vietnam was "hot" in the country no less, was even more offensive because the network in Vietnam is much less protective, especially if compared to the U.S.. Most of the sites in Vietnam, except for a large number of websites of banks, money company, the remaining hackers to attack and attack as the "death" of the data sectors in Vietnam more stolen without your knowledge.
In addition, various types of attacks such as malicious backdoor, spyware, malware taking advantage of the security hole ... usually spread through popular sites, specific audience, purpose specific and individualized plan aims to retrieve the data. Even in recent times longer cybercrime network access, data replication and removed before the data required to pay for the data they have.
According to Nguyen Minh Duc, director of network security Bkav that trend exploded spyware and cyber warfare is not too far away and Vietnam is a victim of cyber-attacks. Currently many computer viruses were "lying" and makes antivirus software "helpless". Actually can not determine how many computers with malware "lying", or how much data stolen modification.
How to prevent
Reason APT attacks are possible because they beat the best human weaknesses - use habits. Furthermore, hackers often use extremely new malware, new to the 80-90% speed can update 4 or 6 hours / 1 times the scout attack clearly, even with the malware designed specifically for a particular customer.
Therefore, to avoid attacks "lying", the user should care about the latest software updates, patches to "seal" all the holes, do not use cracked software, or no copyright ...
Besides, Colonel Hoa also recommends that users should be cautious and wary of emails that feeling unsafe and should call to verify the sender before opening them.
The other news