Newsroom
Media Coverage
Press Releases
Media Contacts
Investor Relations
Trend Micro Predicts Targeted Attacks Will Proliferate Around the Globe
Annual prediction report from cybersecurity leader reveals that retail and financial institutions outside of the US will feel the wrath of cybercriminals in 2015

Trend Micro Incorporated (TYO: 4704;TSE: 4704), has released its annual security predictions report, "Trend Micro Security Predictions for 2015 and Beyond: The Invisible Becomes Visible," and the company's threat defense experts are highlighting the report's forecast that targeted attacks will become rampant from more countries as hackers from the usual suspects have found success targeting victims around the world. Additionally, the report breaks downs seven other cybersecurity threat predictions for 2015 including banks and payment systems.

According to the report, targeted attacks campaigns will continue to multiply in 2015, after cybercriminals had noteworthy breaches via targeted attacks in the U.S. Trend Micro's threat defense experts predict hackers within countries such as Vietnam, UK, and India, will pursue the use of targeted attacks and we will see attacks against non-traditional countries like we've seen recently against Malaysia and Indonesia based organizations.

"What we are seeing today is not a huge surprise but rather the velocity and brutal measures cybercriminals are using to steal information," said Raimund Genes, CTO, Trend Micro. "Following the success of targeted attacks from Chinese and Russian cybercriminals, many hackers from other countries will regard cyber-attacks as a more practical method to grab a foothold in an organization. Additionally, with the incessant barrage of data breaches emerging almost daily, it's reasonable to presume that data breaches will be essentially regarded as a common offshoot of the present threat landscape."

Threats around banking will continue to become more severe as more unique cybercrime attacks against financial institutions also emerge and financial and banking intuitions must implement two-factor authentication for online services.

"The payment ecosystem will continue to evolve," said JD Sherry, vice president of technology and solutions, Trend Micro. "Massive transformation is upon us and we will continue to see threat actors trying to manipulate Near Field Communications (NFC) as certain platforms gain momentum due to their significant following and user's penchant for adopting the latest and greatest technology."

Highlights from the 2015 predications report include:

  • More cybercriminals will turn to darknets and exclusive-access forums to share and sell crimeware.
  • Increased cyber activity will translate to better, bigger, and more successful hacking tools and attempts.
  • Exploits kits will target Android, as mobile vulnerabilities play a bigger role in device infection.
  • Targeted attacks will become as prevalent as cybercrime.
  • New mobile payment methods will introduce new threats.
  • We will see more attempts to exploit vulnerabilities in open source apps.
  • Technological diversity will save Internet of Everything devices from mass attacks but the same won't be true for the data they process.
  • More severe online banking and other financially motivated threats will surface.

The Trend Micro Security Predictions for 2015 also include a continued increase in the exploitation of smart devices such as smart cameras, appliances and TV's as cybercriminals become more aggressive at targeting these platforms as well as the organizations who manage the data.

As factors like market pressure push device manufacturers to launch more and more smart devices sans security in mind to meet the rising demand, so will attackers increasingly find vulnerabilities to exploit for their own gain.

"Smart homes and home automation will continue to proliferate across the globe, further increasing all of our attack surfaces," said Sherry. "As such, smart device manufactures must consider how to secure the data that resides in these devices not just the devices themselves."

View the "Trend Micro Security Predictions for 2015 and Beyond: The Invisible Becomes Visible" at: http://www.trendmicro.com/vinfo/us/security/predictions.

Supporting assets:

Simply Security Blog: http://blog.trendmicro.com/the-invisible-becomes-visible/. TrendLabs Security Intelligence Blog entry: http://blog.trendmicro.com/trendlabs-security-intelligence/2015-predictions-the-invisible-becomes-visible.

About Trend Micro

Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumersbusinesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by more than 1,200 threat experts around the globe. For more information, visit TrendMicro.com.