Understanding Cyber Attackers and Their Sources

Understanding Cyber Attackers and Their Sources

Cybercrime is on the rise. From stealing someone’s credit card information to hacking a large corporation, anyone and everyone is susceptible. And the future shows no signs of cybercrime slowing down. In the recently released Webroot 2016 Threat Brief, Webroot Chief Technology Officer Hal Lonas writes, “It comes as no surprise that the cybercrime ecosystem continues to thrive, given new innovations and little in the way of risk for those who choose to participate.”

As cybercrime continues, it makes us wonder: who are cyber attackers and what is their focus in their cyber attacks. Because the more we know about cyber attackers, the better we are able to secure ourselves against them.

Cyber Attacks and Their Sources

In 2015, there were over 83,000 fake Google sites. Technology and financial companies were the most commonly impersonated, as in scammers created fake websites or emails as means to trick tech and finance users to give away information or money. In 2015, the top five tech companies being impersonated by scammers were Google, Dropbox, Yahoo, Apple, and Facebook. The top five financial institutions impersonated were PayPal, Wells Fargo, Bank of America, Navy Federal, and Chase.

Scammers also use fake URLs to get people. The top ten categories for suspicious to high-risk URLs were malware sites, business and economy, spam URLs, proxy avoidance and anonymizers, society, phishing and other frauds, shopping, travel, health and medicine, and entertainment and arts.

Mobile Attacks On the Rise

As mobile devices have become more popular and as more people use apps on a daily basis, mobile scams are increasing in sophistication. In the United States, app stores are pretty well maintained in regards to app legitimacy and security. But in other countries, app stores are not maintained as well. For example, in China, Android app stores are managed by third parties. Over 30 percent of the apps are malware. That is a huge percentage of apps that run malware, which is a huge risk for app users. The biggest categories of apps likely for malware are tool apps, such as calculators or battery management, at 24 percent and arcade and action apps at 10 percent.

Understanding Cyber Attack Sources Makes a Difference

The odds of falling victim to a cyber attack are not in our favor. But the more we know about cyber attackers and their sources, the more prepared we will be to safely work and play online. Lonas continues, “We believe it is possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they employ for their attacks.”

So by being aware of the most impersonated sites, you know to make sure to really check the URLs when you’re on Google or on your bank website. By knowing which URLs are most high risk for scammers, you know to be cautious when you are on business and other sites. Be careful in what tool apps you download. Make sure the apps are from a viable source with all of its credentials. Be aware of the ways scammers are attacking so that you can prevent yourself from becoming another addition to the number of cybercrime victims every year.

Source: Business Solutions

Pin It on Pinterest

Share This