US CERT: Malware Attacks on Feds Motivated by Money Not Terrorism

Malware attacks against federal agencies appear to be predominately motivated by financial gain rather than terrorism or espionage, according to the U.S. Computer Emergency Readiness Team at DHS.

Around 90 percent of malware incidents detected against U.S. government networks in the first half of 2010 were meant to steal money from unsuspecting users, rather than steal data, as is often believed to be the case.

“This statistic represents the dominance of financially motivated malware within the threat picture,” said Marita Fowler, section chief of the surface analysis group at U.S. CERT. “It is not that the federal government is being targeted by organized criminals; it is that we are a smaller portion of a larger global community impacted by this.”

One of the best ways to combat such attacks is through education, according to Fowler.

“There are plenty of malicious programs designed to steal information from users without their knowledge,” she said. “In these cases, security tools and mitigation strategies are needed to augment user awareness.”

email
Filed in: Cyber Tags: , , , , ,

You might like:

BlackBerry’s Jeffrey Ait: Incentive Policies Could Help Address Cybersecurity Talent Shortage BlackBerry’s Jeffrey Ait: Incentive Policies Could Help Address Cybersecurity Talent Shortage
Frank Dickson: Managed Security Services Customers Value Data Integration Frank Dickson: Managed Security Services Customers Value Data Integration
Lockheed Australian Arm Expands ICT Engineering Hub in Melbourne; Anne Mullins Comments Lockheed Australian Arm Expands ICT Engineering Hub in Melbourne; Anne Mullins Comments
IPKeys-Booz Allen Team Lands DISA Global Info Grid Services Task Order; Robert Nawy Comments IPKeys-Booz Allen Team Lands DISA Global Info Grid Services Task Order; Robert Nawy Comments
© 2014 ExecutiveBiz. All rights reserved.