McAfee announces the 10 major security incident rankings in 2016, the first place is wire fraud

Written By mobilephonebrand

Intel Security (McAfee Co., Ltd.) announced on Tuesday the "2016 10 Great Security Incident Ranking" based on security awareness surveys that investigate companies in Japan.

The survey has been conducted since 2014, and is the third time this year.30 out of security cases that occurred from November 2015 to October 2016 were selected by McAfee, for 1552 men and women over 22 years old, including business owners in Japan, information system and general employees in Japan.In addition, the recognition was investigated on the Internet.The survey period is October 8-11.

The number one ranking in 2015 was a targeted attack on the Japan Pension Service, and according to McAfee Hidemitsu Sakurai (Director of Sales Engineering Division), it was "2015 is a year of targeted attacks", but that trend.It is said that it has changed in 2016.

回答者のプロフィール。業種は製造業とIT・通信が多いが、「企業規模は均等化し、幅広い結果を取り入れるように工夫している」(櫻井氏)

The first place in the 2016 ranking was "Working fraud / damage caused by inconvenience calls" (51).7 %), 2nd place is "fishing for major financial institutions and credit card companies" (36).9 %).These were second and third in 2015, and their rankings went up, but their recognition was lower than last year.

Working fraud has continued throughout the year, and is now not a transfer to a bank account, but a case where a person who claims to be an acquaintance receives money directly, or sends it to the specified address.It is said that it is increasing.

The second -place phishing scam has been ranked for three years as "a method that criminals can easily make money" (Mr. Sakurai).Until now, Internet banking was mainly targeted, but in 2016, it was characterized by examples of exploiting Amazon and LINE IDs and passwords.In addition, he stated that "criminals are trying to hook users in trend watchers, easy -to -catch and terms and terms that are easy to caught in a trend watcher, a fake site that calls commemorative goods on the day after Hiroshima Toyo Carp's championship.。

3rd place is a fake app that deceives the popular "Pokémon Go" that occurred in July 2016 (35).8 %)."The day after the regular app appeared in the United States, a fake app with almost the same screen appeared," he said, "Criminals have watched the trends firmly, and they will install malware.I'm watching. "As a countermeasure, he said, "Fake apps require permission to access unusually as many information at the time of installation. It is important to stop and do self -check."

マカフィー、2016年の10大セキュリティ事件ランキングを発表、1位は振り込め詐欺

4th place is a public wireless LAN security (33).Four%)."Users are usually connected to wireless LAN without much awareness of SSID names, etc.," and criminals are connected to a dummy spot and exploited information.It is a matter of continuing to be careful in the future. "

The fifth place is an attack targeting Japan by Anonimus from October 2015 to February 2016 (28).9 %).In a case where the website of the airport and government agencies was targeted, he said, "Some people have been conscious that they are not targeted, but that Japan could be targeted."

Sixth place in the US Federal Investigation Bureau (FBI) requested Apple to unlock the iPhone used by the culprit in the gun shooting case (28)..In 9 %), attention was focused on how much privacy was and how far the country could be involved.There is no correct answer or answer yet, but he said, "Now that I can have a lot of personal information on my device, I will have problems that I need to think again."

Mr. Sakurai said, "There is an incident that characterizes 2016 in the 7th to 10th place, in a sense," and introduced the contents.The seventh place is Yahoo!, but the state of the nation received a cyber attack in 2014, and personal information was leaked in September 2016 (28)..9 %).

At Yahoo!, the United States has been exploiting more than 500 million people until September 2016, when the case was discovered from 2014.In late July, it was announced that Verison would acquire major businesses in Yahoo! for $ 4.83 billion, but since this information leakage was discovered, the US Verison executives were in October about the acquisition.He is making a review.Mr. Sakurai said, "It shows not only the actual cost of compensation for personal information leakage, but also the impact of the loss of credit.It is necessary to be aware of this. "

The 8th place was a case where a JTB subsidiary, which occurred in June 2016, may have been infected with malware by targeted email and leaked up to about 7.93 million people (28)..3 %)."The subsidiary that sells travel products online was targeted, but it was JTB that loses credit," and three proposals for managers in the "Cyber Security Management Guideline" issued by the Ministry of Economy, Trade and Industry in December 2015.The 10 proposals for security representatives were referred to as an example of reference to affiliated companies, and stated that "the parent company has shown that it should take measures, including the supply chain."

Ninth place was ransomware damage that was 17th last year (28).0 %).Until 2015, individuals were targeted, but in 2016, companies were mainly targeted, and in the United States, medical institutions paid hundreds of millions of dollars.In addition, compared to an example of controlling the system by hitting vulnerabilities and the like, "Ransomware is easy and easily damaged.""It is not an exaggeration to say that 2016 is a year of ransomware," and said, "Malware targeting mobile is increasing, and targets such as IoT devices will be diversified after next year."Showed the prediction.

The 10th place was a case that occurred in June 2016, and a 17 -year -old boy in Saga Prefecture made an unauthorized access using an exploit kit on the prefectural school information system, and a file containing about 153,000 files including personal information.Leaked (21).6 %)."The size is not large considering the leaked information, but it was noted that a 17 -year -old boy could invade the university LAN using the Exploit kit."

Mr. Sakurai overall the ranking said, "Everything will be the target when various devices, including smartphones, are connected to the Internet," and "If you develop a good rans -wear for criminals, you will develop a good ranswear.You can get a huge wealth just by making seeds, "he said, the criminal is a trend watcher, assuming that new methods will appear every day."