{"id":2809,"date":"2015-01-01T02:20:09","date_gmt":"2015-01-01T02:20:09","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=2809"},"modified":"2016-08-14T21:29:38","modified_gmt":"2016-08-14T21:29:38","slug":"highlights-and-lowlights-of-2014-a-golden-year-for-cybercrime","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/highlights-and-lowlights-of-2014-a-golden-year-for-cybercrime\/","title":{"rendered":"Highlights and lowlights of 2014, a golden year for cybercrime"},"content":{"rendered":"<p>By <a href=\"http:\/\/theconversation.com\/profiles\/andrew-smith-121006\">Andrew Smith<\/a><em>, <a href=\"http:\/\/theconversation.com\/institutions\/the-open-university\">The Open University<\/a><\/em><\/p>\n<p>Looking back, 2014 was not a good year for keeping things safe under digital lock and key. If a score was being kept, it might seem that the cybercriminals are in the lead, despite the valiant efforts \u2013 and own goals \u2013 from the cybersecurity profession worldwide.<\/p>\n<p>Cast your mind back to <strong>March<\/strong>, everyone was panicking about the <a href=\"https:\/\/theconversation.com\/explainer-should-you-change-your-password-after-heartbleed-25506\">HeartBleed<\/a> bug. Based on an error in code upon which the majority of the world\u2019s secure servers relied, experts had plenty of time to fix the issue. Sadly there was an array of conflicting information about changing passwords, leading to widespread confusion. While most IT administrators made sure this was managed in a professional manner, it created a stir that seemed to set the tone for the year.<\/p>\n<p>In <strong>May<\/strong>, online auction giant <a href=\"https:\/\/theconversation.com\/massive-ebay-hack-change-your-password-now-27052\">Ebay<\/a> admitted to having been compromised. The site said its systems, with personal details of tens of millions of users, may have had been vulnerable for months. Everyone was advised, indeed forced, to change their password.<\/p>\n<p>In the same month, iPhones were hijacked and their owners blackmailed by the cunning <a href=\"https:\/\/theconversation.com\/explainer-is-your-iphone-at-risk-after-the-oleg-pliss-hack-27288\">Oleg Pliss<\/a> ransomware, locking phones and threatening to delete data unless cash was paid.<\/p>\n<p>In this case, the criminals managed to acquire a database of usernames and passwords, maybe via HeartBleed, and cracked the passwords. As it\u2019s well-known that many users reuse the same passwords for many accounts, the Oleg Pliss attackers searched for iCloud email accounts and simply stepped through their list of passwords until they were successful. Then they remotely locked the phones and demanded a ransom. What was clever about this attack is that it targeted the weak link \u2013 lax security among humans \u2013 rather than the tough target, the security of the iPhone itself.<\/p>\n<p>Already 3-0 to the cybercriminals by half-time, it wasn\u2019t looking too good for Team Cybersecurity. In <strong>June<\/strong> there was finally a score for law enforcement: <a href=\"https:\/\/theconversation.com\/two-weeks-to-stop-gameover-zeus-what-you-need-to-know-27536\">Gameover Zeus<\/a>, a prolific botnet, was brought down through a combined operation from the FBI, UK National Crime Agency and other international agencies. It gave security experts time to hose down their systems, upgrade security measures and re-group, knowing that it would be weeks before this botnet could rally.<\/p>\n<p>The most popular mobile phone and tablet operating system, Android did not have a good year. With the most <a href=\"https:\/\/theconversation.com\/explainer-which-phone-is-most-vulnerable-to-malware-25942\">mobile malware<\/a>, Android is seen as a system that needs to clean up its act, with vulnerabilities exploited <a href=\"https:\/\/theconversation.com\/had-an-odd-text-on-your-android-device-time-to-watch-out-for-sms-worms-28624\">through text messages<\/a>, and potentially revealing <a href=\"https:\/\/theconversation.com\/naked-selfies-found-on-wiped-phones-shows-how-data-isnt-always-deleted-29119\">intimate details<\/a> left behind on second-hand devices that had been supposedly wiped.<\/p>\n<p>In <strong>July<\/strong>, the focus was back on Apple\u2019s iOS phone operating system, in which a <a href=\"https:\/\/theconversation.com\/backdoor-discovered-in-apple-ios-devices-that-undermines-iphone-security-29601\">back door<\/a> was discovered, proving a major embarrassment for the company. It\u2019s interesting that the subsequent release of iOS, version eight, brought full encryption to the phone, suggesting that Apple has tried to fill this hole \u2013 <a href=\"https:\/\/theconversation.com\/after-all-these-hacks-tech-firms-could-do-more-but-better-security-starts-with-you-32051\">much to the annoyance<\/a> of some national security agencies.<\/p>\n<p><strong>September<\/strong> arrived with a bang, as dozens of celebrities found <a href=\"https:\/\/theconversation.com\/three-ways-your-personal-photos-are-vulnerable-to-hackers-31134\">naked pictures of themselves<\/a> posted online. The issues earlier in the year that proved the potential to gain access to iCloud accounts had been realised, with the images stripped not from the phones themselves but from the iCloud accounts linked to them. Apple\u2019s response was to generate a notification following any access to an iCloud account \u2013 but that may be too little too late if an intruder has already copied your more intimate snaps.<\/p>\n<p>Later the same month, the discovery of the <a href=\"https:\/\/theconversation.com\/bigger-than-heartbleed-bug-in-bash-leaves-millions-of-web-servers-vulnerable-32231\">Shellshock<\/a> bug makes it 7-1. This was a another issue arising from decades old code in the <a href=\"http:\/\/www.gnu.org\/software\/bash\/\">Bash shell<\/a> software, since incorporated into millions of computers and embedded devices worldwide. It\u2019s ironic that, after years in which Microsoft Windows was regularly compromised, 2014 was the year in which the heat was turned on open source systems like Linux.<\/p>\n<p>As <strong>November<\/strong> came around we witnessed a spectacular own goal, when a particularly complex and aggressive malware, <a href=\"https:\/\/theconversation.com\/introducing-regin-one-of-the-most-sophisticated-espionage-bugs-ever-discovered-34616\">Regin<\/a>, was alleged to be the product of Western intelligence agency experts. Of course, nobody has come forward to take the credit \u2013 but it\u2019s clear that there are very capable cybersecurity or cybercriminal experts out there who have the time and resources to create bespoke attacks for their own ends.<\/p>\n<p><strong>December<\/strong> brings the season for joy for many \u2013 but not for <a href=\"http:\/\/www.engadget.com\/2014\/12\/10\/sony-pictures-hack-the-whole-story\/\">Sony Pictures<\/a>, which suffered an attack that leaked unreleased films online, posted embarrassing internal emails for all to see, and brought the company\u2019s internal systems to their knees. Perhaps most embarrassing is that this seems to be <a href=\"https:\/\/theconversation.com\/credibility-at-risk-in-sony-hacking-scandal-1038\">becoming a habit<\/a> for Sony Corporation.<\/p>\n<p>Come <strong>Christmas Day<\/strong>, the servers supporting the XBox and PlayStation online gaming platforms were <a href=\"http:\/\/www.bbc.co.uk\/news\/uk-30602609\">hacked<\/a>.<\/p>\n<p>All in all, such a 10-1 thrashing points to an eventful year, and unfortunately leaves no doubt that the criminals have the edge, leaving the security experts nursing their own goals and playing catch up.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/counter.theconversation.edu.au\/content\/35508\/count.gif\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>.<br \/>\nRead the <a href=\"http:\/\/theconversation.com\/highlights-and-lowlights-of-2014-a-golden-year-for-cybercrime-35508\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Andrew Smith, The Open University Looking back, 2014 was not a good year for keeping things safe under digital lock and key. If a score was being kept, it might seem that the cybercriminals are in the lead, despite the valiant efforts \u2013 and own goals \u2013 from the cybersecurity profession worldwide. Cast your [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":6162,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[38],"tags":[],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/2809"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=2809"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/2809\/revisions"}],"predecessor-version":[{"id":6163,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/2809\/revisions\/6163"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/6162"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=2809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=2809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=2809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}