Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 9 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Threat-Actor Opportunism At Peak During Holiday Season.

by The Gurus
December 7, 2018
in Featured, Opinions & Analysis
Threat-Actor Opportunism At Peak During Holiday Season.
Share on FacebookShare on Twitter

Mike Mimoso, Editorial Director, Flashpoint

Attackers’ opportunism is never higher during the year than in the holiday shopping season. As a result, businesses must be aware of the potential for increases in malware attacks against point-of-sale (PoS) systems, the possibility of distributed denial-of-service (DDoS) attacks against popular web-based services, and attempts to bypass fraud-detection systems, to name just a few seasonal risks.

All of these are heightened by a month-long increase in online shopping and spikes in usage of gaming and streaming services precipitated by people having downtime away from their jobs and school.

The answer isn’t a complicated one: businesses must maintain a mix of basic vigilance around patching of critical systems, awareness of attackers’ tactics and targeting, and reinforce education among users to potential risks to the business and threats specific to the holiday season.

In the meantime, here’s a review of some of the holiday gifts your organisation would rather avoid:

Point-of-Sale Systems Always a Lucrative Target

Americans are expected to spend more than $120 billion in retail ecommerce during 2018’s 32-day holiday shopping season—up $17 billion from last year, and $53 billion from 2014. That enormous volume of shopping during a relatively short period time puts stress on the security of PoS systems in the U.S. These are lucrative targets, and they’ve been exploited in the past through attacks against giant retailers and hospitality providers, resulting in the loss of tens of millions of payment card records and the personal data of victims.

Researchers have studied particular PoS malware families in the recent past and saw demonstrable spikes in data exfiltration from these systems, in particular on Thanksgiving weekend, which includes Black Friday. And while it should be noted that these types of attacks are not limited to the holiday shopping season, there is a pattern of heightened activity that figures to continue.

DDoS Attacks More than a Holiday Nuisance

Some attackers still crave attention and what better way for some than to ruin Christmas morning by carrying out DDoS attacks against popular gaming networks, or New Year’s Day, one of the busiest days of the year for video streaming services.

The Lizard Squad’s infamous 2014 Christmas-Day takedown of the Xbox and PlayStation networks put organisations across industries on notice. Many fearing similar action during what is supposed to be a quiet period ramped up in subsequent years by putting aggressive defences in place internally and cooperating with law enforcement.

Similarly, financial institutions have been largely spared since a series of DDoS attacks against high-profile banks and organisations in late 2012 and early 2013 triggered a similar run of investments in DDoS mitigation tools and in intelligence services seeking advance knowledge of the planning of such attacks.

Refund Fraud, Phishing, and Fraud-Detection Bypasses for the Holidays

Attacks during the holiday shopping season don’t have to be as bombastic as a major DDoS attack or pilfering tens of millions of payment cards from an unprotected PoS system. Threat actors can also chip away at profits during the holidays through refund fraud schemes, phishing pages, and attempts to circumvent fraud-detection systems.

Refund fraud peaks during the holidays according to Flashpoint’s dataset; it involves a threat actor making online purchases that are shipped to a drop site, for example, and then the actor claims to have never received the purchase. They are issued a refund and get the product at no cost. Analysts evaluated seasonality effects on refund-related chatter across Flashpoint’s DDW dataset; the lowest amount of chatter surrounding refund fraud occurred in September, before steadily increasing through the holiday season, after which it began to decline again in late January.

Phishing is certainly a year-round threat, but during the holidays, threat actors looking to capitalise on high volumes of consumer shopping will create fraudulent shopping sites that look legitimate. While appearing legitimate, these sites often falsely advertise discounted products hoping to entice unsuspecting victims. Without further training and user awareness, these attacks, which take advantage of the human factor instead of technological vulnerabilities, are likely to continue.

Fraud-detection systems are also stressed during peak holiday shopping days, and threat actors have been known to try to exploit this scenario. Discussions on underground forums in the past have centered around the use of stolen payment card information during the holidays and the types of activities that may trigger a fraud-detection system.

Assessment

Fraud is not a just seasonal threat to retailers by any means. Many vendors try to capitalise on the holiday season by spreading fear, uncertainty, and doubt in their marketing, which only compounds what is already an especially busy season for those administrators and managers defending retail networks.

Some threats to businesses, however, do have their peaks during the holidays. Flashpoint analysts assess that threat actors are likely to recycle many of the same—or variations of—attacks. It is recommended that organisations maintain a high level of alertness and awareness during this time period and they educate their workforce and customers so they are less vulnerable to targeting during the holiday season.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Modern Chat Services & Cybercrime.

Next Post

2019 Cybersecurity Predictions From SecBI CEO Gilad Peleg.

Recent News

Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato SASE Cloud Named “Leader” and “Outperformer” in GigaOm Radar Report for SD-WAN

February 7, 2023
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

UK second most targeted nation behind America for Ransomware

February 7, 2023
safe

Will Emphasising App Security Lead to More App Installs?

February 6, 2023
Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information