• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   FBI Looks Into Crystal Ball and Details SMB Attack Trends

FBI Looks Into Crystal Ball and Details SMB Attack Trends

  • Posted on:December 6, 2013
  • Posted in:Security
  • Posted by:
    JD Sherry (VP, Technology and Solutions)
0

I had a tremendous opportunity this week to moderate and co present with an FBI special agent regarding the latest attack trends against SMB (Small and Medium Sized Businesses). Our audience was informed on the types of tactics and approaches being leveraged by cyber criminals, hacktivists as well as nation-state actors against SMB’s. The cadence and level of sophistication in which these attacks are happening are very concerning and the data the FBI shared coincides with the trends and research we see at Trend Micro. This is very alarming considering that SMB’s are often considered the primary engine for growing the economy in the US. 

Our talk focused heavily on distilling the technical complexities associated with cybersecurity and technology in general. The FBI special agent did a fantastic job of orchestrating the talk in a fashion that all users could understand the content as well as the gravity of the situation. He outlined that attacks will continue to mount against SMB’s and countermeasures are needed.  

As more and more businesses leverage social media to increase awareness and market their goods and services, cybercriminals will be one step ahead. They are already using the social media platforms to wage attacks against individuals in Facebook, LinkedIn and Twitter. In fact, compromised Facebook and Gmail accounts were the topic of conversation this week. It is estimated that more than 2 million accounts were found stored on servers in the Netherlands. It’s safe to assume that many small business owners and their respective PC’s were part of this particular campaign. This most likely was due to the clicking on malicious links in a spam campaign that resulted in malware being installed that would gather keystrokes and credentials used for accessing these accounts. It’s also safe to assume that other key credentials such as banking and/or financial information was also compromised as a result of this malicious effort. 

In the end, we discussed that an “ounce of prevention is worth a pound of cure.”  Ultimately within the realms of technology, that means taking the time to deploy basic security countermeasures on all your devices accessing the public Internet.  Make sure to install leading anti-malware packages and keep your applications and operating system up to date with the latest patches. This not only helps you with new features and functionality but also helps you with the security of your systems to prevent a compromise on your personal or business PC’s in which you use to conduct commerce in your respective small and medium-sized business.

Related posts:

  1. FBI details major trends in cyber attacks against SMB’s
  2. Hacker Group “Anonymous” Threatens Facebook Attack
  3. Which specific malware trends should American businesses be prepared for?
  4. Details Behind the NBC Honeypots: Part 2

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.