2014 Threats Predictions: Cybercrime and Hacktivism Will Continue to Grow

This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and evolving threats we expect to see in the coming year. This article was written by François Paget.

The Bitcoin saga will continue

In May, after the Liberty Reserve shutdown, cybercriminals looked for new sources of virtual currency to finance their businesses. They turned to Perfect Money, WebMoney (for a second time), and Bitcoin. But associating these virtual currencies with electronic or conventional (state guaranteed) moneys remained difficult. Cybercriminals had to use their virtual currencies primarily on the underground market, among themselves, to purchase drugs, services, or equipment. This money was directly reinvested in the black market and was difficult to launder. It was also difficult to retrieve “good money” like dollars or Euros.

But cybercriminals, and lawful users, have found a bit of relief. Some nation-states have decided to recognize Bitcoin: In August, Germany became one of the first countries in the world to recognize Bitcoin as a “private money”; in October, we saw the opening of the world’s first Bitcoin ATM in Vancouver, Canada. At the same time, French boutiques started offering branded perfume for sale and nights at luxurious hotels, Los Angeles restaurants accepted Bitcoin for payment; and an online newspaper claimed a Norwegian citizen bought an Oslo apartment—all with Bitcoin.

Given this increasing acceptance and barring a virtual stock market crash, we predict Bitcoin will remain popular and become a target for cybercriminals in 2014. With more access to the public, Bitcoin will certainly be used for money laundering. Attacks and fraud on exchange platforms, which have already occurred, will increase. Up to now, virtual money has been a platform on which cybercriminals worked in a closed world. In 2014, they will be able to hunt for newcomers.

This interest in virtual and decentralized money will attract more attention from law enforcement and justice officials. Following the money (and the criminals) will become more difficult. The battle against the Dark Web will not be easy to win.

Opportunities for cybercrime

In the coming year, the frontier between cybercrime and state-sponsored attacks will grow more porous. We expect to see advanced spying as a service, “waterholing” as a service, and cracking as a service. As with past aggressive marketing proposals, the distinction between legitimate and illegal activities will be more difficult to determine. Some illicit services will hide among legitimate ones.

As a complement to ATM or point-of-sale skimming, cybercriminals will improve ways to directly infect ATM machines. 3D printers are sometimes used to create skimming devices. These printers will become more popular in cybercrime circles. We anticipate ready-to-use firearms will be the next hot 3D objects sold online.

Snowden boosts hacktivism movement

In November the “Million Mask March” organized by Anonymous attracted people in 450 locations around the world. This success can partially be attributed to the Edward Snowden affair, which will cause new supporters to join the movement. Fearing big brother surveillance systems, many citizens distrust their local administrations, forcing governments to delay the introduction of some legal procedures to fight cybercrime.

However, the varied motivations of Anonymous members will prevent most of their Internet operations from gaining much success. They will be numerous, as in 2013, but rarely highly damaging for their victims.

The Anonymous movement is only one face of hacktivism. Next year its signature will continue to be misappropriated by individuals or groups that range far from Anonymous’ ideals of freedom. Hacktivism in and from the Middle East will continue to grow.

Cyberwarfare a reality

Resulting from a voluntary attack or out-of-control spreading, malware can not only destroy computer data, but also disrupt people’s lives.

In September, malware in Israel caused the closure of a major roadway. One expert, speaking on the condition of anonymity, explained the attack was the work of unknown, sophisticated hackers, similar to the Anonymous group that led attacks on Israeli websites in April.

Politically motivated attacks will continue to increase. We’ll see more from patriots hiding behind the Anonymous brand or labeling themselves cyberarmies. Others will arrive from online spies of governments developing cyberoffensive capabilities. If cyberattacks against critical infrastructure succeed, we will have truly reached the age of cyberterrorism.

The 2014 Sochi Winter Olympics (in February) and the FIFA World Cup in Brazil (June-July) will be massive opportunities for criminals to exploit people’s curiosity to infect their systems with crimeware (for example, via booby trapped email or compromised sites). Hacktivists will also take advantage of these events to promote their ideas. In recent years, we’ve seen destructive malware associated with some politically motivated attacks. These attacks will continue in 2014.

Rioting and racism

Criminals have understood for years that it is easier and less dangerous to steal money online rather than in the physical world. This may be the year that rioting demonstrators will learn the same lesson. Data destruction just for pleasure may become a new threat if politicians cannot mollify certain violent elements of the population.

Racism is not dead and may become a new motivation for defacement. It’s growing on social networks (Facebook, Twitter, etc.). More of the Internet may be poisoned if we are not careful. Information manipulation is another threat we expect to see next year. Massive deliberately propagated digital misinformation could lead to confusion or worse.

Malware in humans a future nightmare

At some point in the future, physical attacks through the cyberworld will move beyond to science fiction to reality. We expect to see real attacks or nasty proofs of concept against human implants in the coming years. We might also see psychological attacks via virtual reality games that lead to physical consequences.

Patient medical data, political party databases, and personal data from online VIP services will be increasingly targeted. Hackers will enjoy more successes searching for sensitive information on politicians, sports figures, and celebrities. Depending on the attackers’ motivation (money or ill intent), they will carry out blackmail or damage to reputations.

Leave a Comment

1 × 3 =