Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Who’s in the Cross Hairs of Cybercriminals?

by GTI Editors
October 4, 2013
in Cybersecurity
Reading Time: 2 mins read
A A
Share on FacebookShare on Twitter

Quick, answer off the top of your head – which industries are the most likely to be targeted by cybercriminals?

Mandiant, the company who exposed the Chinese Army’s APT assault on US government and industry targets, recently did a data analysis to reveal which industries are most likely to be the target of cybercrime.   Based on data Mandiant researchers collected in Q2 2013, the results revealed both the expected and unanticipated.  It goes without saying, for example, that cybercriminals are motivated by financial gain, but the type of financial gain that is being pursued has evolved from short term payoff to longer term benefit.  Moreover the change in motivation is, as the Mandiant research reveals, also altering the way in which cybercriminals are executing their attacks and supported by rogue states.

Here’s an excerpt of the Mandiant findings:

On the cybercriminal side, we’re also seeing tactics that look like more traditional APT behavior. Some cybercriminals are willing to spend the time doing network reconnaissance, installing backdoors, and moving laterally through a victim’s environment to get what they want, rather than the typical “smash and grab” approach. In a recent Mandiant investigation, cybercriminals repeatedly accessed backdoors that they had placed in a victim’s environment every 2-3 days. We believe these targeted cybercriminals have the resources to allow them to undertake more intensive–and potentially more damaging—operations.

To read the full article and subscribe to the Mandiant Threat Intelligence Center click here…

Tags: APTCybercrimeCybercriminalsMandiant APT

RELATED POSTS

Cyber Attacks Against Critical Infrastructure
Security

Cyberattacks Against Critical Infrastructure: How Vulnerable is the United States?

April 5, 2021
Linux Under Attack: Research Shows Government Agencies Targets for China-Backed Bad Actors
COVID-19

Linux Under Attack: Research Shows Government Agencies Targets for China-Backed Bad Actors

May 26, 2020
healthcare cybersecurity
Cybersecurity

HHS, CMS, and Other Healthcare Agencies Still at High Risk for Cyber Attacks

September 13, 2019
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5386 shares
    Share 2154 Tweet 1347
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us