Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Cybercriminals borrow from APT playbook in attack against PoS vendors

Lucian Constantin | May 6, 2015
Cybercriminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.

This is a shift from the traditional cybercriminal attacks where the goal is to compromise as many victims as possible, regardless of who they are or what they do.

It's clear that cybercriminals today engage in both indiscriminate campaigns and targeted attacks, the FireEye researchers said. "The combination of these targeted intrusions with a widely deployed payload can make it difficult for network security monitors to assess the level of risk associated with the threat."

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.