US CERT: Malware Attacks on Feds Motivated by Money Not Terrorism

Malware attacks against federal agencies appear to be predominately motivated by financial gain rather than terrorism or espionage, according to the U.S. Computer Emergency Readiness Team at DHS.

Around 90 percent of malware incidents detected against U.S. government networks in the first half of 2010 were meant to steal money from unsuspecting users, rather than steal data, as is often believed to be the case.

“This statistic represents the dominance of financially motivated malware within the threat picture,” said Marita Fowler, section chief of the surface analysis group at U.S. CERT. “It is not that the federal government is being targeted by organized criminals; it is that we are a smaller portion of a larger global community impacted by this.”

One of the best ways to combat such attacks is through education, according to Fowler.

“There are plenty of malicious programs designed to steal information from users without their knowledge,” she said. “In these cases, security tools and mitigation strategies are needed to augment user awareness.”

Share this story...Tweet about this on Twitter0Share on LinkedIn0Share on Facebook0Share on Google+0Email this to someone
Filed in: Cyber Tags: , , , , ,

You might like:

WidePoint Subsidiary Gets DHS Task Orders for Managed Mobility Services WidePoint Subsidiary Gets DHS Task Orders for Managed Mobility Services
Microsoft Execs: Continuous Detection, Uniform Standards Key in Federal Cyber Defense Efforts Microsoft Execs: Continuous Detection, Uniform Standards Key in Federal Cyber Defense Efforts
BAE, Boeing, Raytheon Join MIT Cyber R&D Alliance BAE, Boeing, Raytheon Join MIT Cyber R&D Alliance
Chuck Harrington: Parsons’ New Virginia-Based Cyber Center to Offer IT Risk Mgmt Services Chuck Harrington: Parsons’ New Virginia-Based Cyber Center to Offer IT Risk Mgmt Services
© 2015 ExecutiveBiz. All rights reserved.