US CERT: Malware Attacks on Feds Motivated by Money Not Terrorism

Malware attacks against federal agencies appear to be predominately motivated by financial gain rather than terrorism or espionage, according to the U.S. Computer Emergency Readiness Team at DHS.

Around 90 percent of malware incidents detected against U.S. government networks in the first half of 2010 were meant to steal money from unsuspecting users, rather than steal data, as is often believed to be the case.

“This statistic represents the dominance of financially motivated malware within the threat picture,” said Marita Fowler, section chief of the surface analysis group at U.S. CERT. “It is not that the federal government is being targeted by organized criminals; it is that we are a smaller portion of a larger global community impacted by this.”

One of the best ways to combat such attacks is through education, according to Fowler.

“There are plenty of malicious programs designed to steal information from users without their knowledge,” she said. “In these cases, security tools and mitigation strategies are needed to augment user awareness.”

email
Filed in: Cyber Tags: , , , , ,

You might like:

General Dynamics’ Nadia Short: High-Profile Threats Spur Demand for Cyber Defense Products General Dynamics’ Nadia Short: High-Profile Threats Spur Demand for Cyber Defense Products
Cisco Report: Companies Should Organize Security Priorities Cisco Report: Companies Should Organize Security Priorities
Leidos’ Rob Zitz: White House Should Push for Govt-Industry Cyber Intell Exchange Leidos’ Rob Zitz: White House Should Push for Govt-Industry Cyber Intell Exchange
Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber Partnerships Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber Partnerships
© 2015 ExecutiveBiz. All rights reserved.