Taipei, Nov. 20, 2014 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), has released its H1 2014 Targeted Attack Trends Report for the Asia Pacific (APAC) region. The report has found that threat actors targeting the region are continually refining their targeted attack tactics, which allows them to remain undetected. At the same time, old vulnerabilities resulting from unpatched software and applications are being exploited to the fullest. With Trend Micro’s 2015 security predictions further predicting targeted attack campaigns in APAC to increase in size and scale, 2015 may very well become the year where targeted attacks come of age.
Most of the malware used in targeted attacks were Trojans or Trojan spyware (53%), followed by backdoors (46%). Backdoors typically aid in establishing C&C communications and executing remote commands while Trojans and Trojan spyware aid in downloading the final payload and exfiltrating data.
Some of the notable campaigns for 1H 2014 included:
Other APAC targeted attack campaigns that were still actively running in 1H 2014 include IXESHE, PLEAD, ANTIFULAI, and Taidoor.
“The efficacy of targeted attacks this year so far indicates that organizations still struggle to understand targeted attacks. One possible misconception is that targeted attacks are one-time efforts, whilst in reality they are well-planned and can be launched several times until they successfully compromise intended network targets,” said Dhanya Thakkar, Managing Director, APAC, Trend Micro. “To fight back, organizations today need a custom defense strategy, which uses advanced threat detection technologies and shared intelligence to detect, analyze, and respond to attacks that are invisible to standard security products.”
For the full report, please refer to: http://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/targeted-attack-trends-apac-1h-2014
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by more than 1,200 threat experts around the globe. For more information, visit TrendMicro.com.