The progress of science and technology has always had a dark side to it. Kaspersky Lab’s security solutions have always given our customers — both individual consumers and large corporations — the ability to have full confidence in their computers, to trust them completely, at every stage of cyber threat evolution.
The Securing Smart Cities project was rolled out to identify the weaknesses of urban infrastructure and come up with recommendations for city managers
The world is going to have more than 20 billion Internet-capable devices by 2020. And these are going to be not so much smartphones as is the case today, as stand-alone equipment, such as military and civilian robots, which are going to perform all kinds of routine tasks. Attacks against technical «personnel» will become prevalent in antivirus companies’ reports very soon, and malware targeting robots will become as ubiquitous as are smartphone apps now.
Songdo, a city in South Korea, has sensors installed on every square meter of the city connected to central control units. Residents Milton Keynes, England, get around in self-driving cars and public transit vehicles. A city-wide operating system controls public utilities in Barcelona. Researchers are discovering vulnerabilities in elements of future smart cities which are already in operation today (for example, in outdoor security cameras; in police body cameras in the US; traffic lights and subway data systems). The day is not far when smart cities will begin to interact by distributing infrastructure loads efficiently, which means that a vulnerability in just one element can trigger a domino effect, infecting the whole system, taking cyber terrorism to an entirely new, much more chilling, level.
Household appliance (and, sure enough, home robots) will take control of all the household tasks, giving instructions to one another, just to keep the human masters happy. Weave, one of the world’s first device-to-device interaction protocols, has already been developed for the purpose. However, connected devices in the home and office are facing the same problem as connected hardware outdoor — they are vulnerable to cyber attacks and the same highly dangerous domino effect if an attack is successful. Gartner forecasts that more than 25% of known attacks against industrial companies will be channeled through elements of the Internet of Things by 2020. And the cars city dwellers of the near future will use to commute to work in the near future are also vulnerable, as was proven in 2015. The experiment was repeated in 2016, with even more dire consequences.
The blockchain technology — a decentralized network for simultaneous transactions — will sooner or later replace conventional exchanges and other autonomous transaction registration systems. Unauthorized withdrawal of at least US$ 50 million from The Dao, the world’s first fully automated investment fund (where DAO stands, among other things, for a decentralized autonomous organization) showed that theft is possible even without use of any malware. The criminals tricked the system by using the time lag between actual cash withdrawal and the transaction getting reflected in The Dao account, as well as the capability of creating a subsidiary to which Ethers can be transferred (Ether/ETH, a relatively new cryptocurrency created as part of the Etherium project). Cryptoexchanges, which provide venues for trading Bitcoins, Ethers, Litecoins and other cryptocurrences, are constantly coming under attack, even before they become established and gain a significant following.
Kaspersky Lab released a free tool to protect smaller and medium-sized businesses (SMB) against encryption and ransomware on August 9, 2016, Kaspersky Anti-Ransomware Tool for Business 1.0 Beta 2. The tool uses System Watcher to track malicious activities by unknown «strains» of malware, while Kaspersky Security Network is responsible for checking the system for any code samples of ransomware and encryption ware already known to KL. The new tool is compatible with many security solutions by third-party vendors.
There is no magic bullet — a software tool that can recover any file regardless of what malware was used to encrypt it. However, Kaspersky Lab experts wrote the code for RannohDecryptor, a free decryption tool capable of dealing successfully with several Trojans. The tool was originally created to help the victims of Rannoh encryption malware, and then more functionality was added to the tool, and now the victims of CryptXXX can also «life the evil spell» from their encrypted files.