- Targeted threat
Targeted threats are a class of
malware destined for one specific organization or industry. A type ofcrimeware , these threats are of particular concern because they are designed to capture sensitive information. Targeted attacks may include threats delivered via SMTP e-mail, port attacks,zero day attack vulnerability exploits orphishing messages. The home user is the most targeted sector. Financial industries are the second most targeted sector, most likely because cybercriminals desire to profit from the confidential, sensitive information the financial industry IT infrastructure houses. [Symantec Corp., Symantec Internet Security Threat Report, Vol X, Sep. 2006, p. 9.] Similarly, online brokerage accounts have also been targeted by such attacks. [Security and Exchange Commission. "Online Brokerage Accounts: What You Can Do to Safeguard Your Money and Your Personal Information." http://www.sec.gov/investor/pubs/onlinebrokerage.htm]Impact
The impact of targeted attacks can be far-reaching. In addition to regulatory sanctions imposed by
HIPAA , Sarbanes-Oxley, the Gramm-Leach-Bliley Act and other laws, they can lead to the loss of revenue, focus and corporate momentum. They not only expose sensitive customer data, but damage corporate reputations and incur potential lawsuits. [Williams, Amrit T., Hallawell, Arabella, et. al, "Hype Cycle for Cyberthreats, 2006", Gartner, Inc., Sept. 13, 2006, p. 17]Detection and prevention
In contrast to a widespread spam attack, which are widely noticed, because targeted attacks are only sent to a limited number of organizations, these crimeware threats tend to not be reported and thus elude malware scanners. [Shipp, Alex quoted in Gibbs, Wayt. "The Rise of Crimeware.", February 23, 2006. http://blog.sciam.com/index.php?title=the_rise_of_crimeware ]
*
Heuristics
* Multiple-layeredpattern scanning
* Traffic-origin scanning. Targets known bad locations or traffic anomalies.
* Behavior observation. Including desktop emulator solutions and virtual machine behavior analysis.Examples
* In one instance,
Trojan horses were used as a targeted threat so that Israeli companies could conductcorporate espionage on each other. [Williams, Dan. "Israel holds couple in corporate espionage case." "http://www.computerworld.com/securitytopics/security/virus/story/0,10801,108225,00.html?from=story_kc, Jan. 31, 2006]
* The Hotword Trojan3, the Ginwui4 and the PPDropper Trojans are additional examples of Trojans used for corporate espionage. [Symantec Corp., Symantec Internet Security Threat Report, Vol X, Sep. 2006, p. 4.]
* Targeted destination attacks use harvested IP addresses to send messages directly to recipients without an MX record lookup. It aims for specific sites and users by defeating hosted protection services and internal gateways to deliver e-mail with malicious payloads. [Avinti, Inc. "Targeted Destination Attacks." Sep. 2005. http://www.avinti.com/download/labs/targeted_destination.pdf]External links
* [http://www.daemon.be/maarten/targetedattacks.html An analysis of Targeted Attacks]
Notes
Wikimedia Foundation. 2010.