Reading the ENISA Threat Landscape 2014 report

The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.”

The European Union Agency for Network and Information Security (ENISA) has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.”

This ENISA Threat Landscape 2014 report (ETL 2014) was prepared by collecting and analyzing threat data of the last 12 months (December 2013 – December 2014).

The document is composed of the following sections:

  • “Purpose, Scope and Method” provides some information regarding the threat analysis process.
  • “ETL 2014: Current Threat Landscape” contains top 15 cyber-threats assessed in 2014 and related information.
  • “Threat Agents” contains the profiling of threat agents.
  • “Attack Vectors” contains information on typical attack scenarios.
  • “The Emerging Threat Landscape” indicates assessedtechnology areas that will impact the
  • “The Emerging Threat Landscape” reports the areas that will impact the threat landscapes in the middle-term.
  • “Food for thought: Lessons Learned and Conclusions”

This year the threat landscape is characterized by significant upheavals, the number of cyber attacks has grown rapidly as well as their complexity despite the excellent action of law enforcement, which influenced the evolution of the criminal ecosystem.

“In the ETL 2014, details of these developments are consolidated by means of top cyber threats and
emerging threat trends in various technological and application areas. References to over 400 relevant
sources on threats will help decision makers, security experts and interested individuals to navigate
through the threat landscape.” reads the ENISA Threat Landscape 2014,

The take down of GameOver Zeus botnet which was conducted by the DoJ and the FBI in a multinational effort has dealt a blow to cyber crime sindacate, the arrest of the author of the popular Blackhole and the seizure of numerous underground black markets on Tor as part of the Onymous Operation, are just a few example of successfully action operated by law enforcement.

2014 was also characterized by significant threats to the overall Internet infrastructure, let’s consider the increase of the DDoS amplification attacks (i.e. NTP-based reflection DDoS attacks) or the numerous flaws affecting popular encryption libraries like the Heartbleed and the Poddle bugs.

2014 is considered the year of data breaches, the number of incidents is dramatically increased, in frequency and severity, exposing hundreds of millions of records of unsuspecting users.

“The massive data breaches that have been identified demonstrate how effectively cyber threat agents abuse security weaknesses of businesses and governments.” states the report.

Analyzing the attacks against websites, experts noticed that SQL injection, which is still one of the most effective attack techniques, is on the decline due to information sharing on the threat.

Privacy is the topic that most of all interested Internet community, netizens fear numerous surveillance program run by governments and have fueled mistrust in the network.

The cyberspace is the new battlefield, a growing number of targeted campaigns were characterized sophisticated attack schemes that benefiting efficient evasion techniques.

The report provides useful information to reduce the surface of attack and exposure to cyber threats. The Agency will continue to collect information on cyber threats and will improve critical operation like information sharing.

This report is a must read for cyber-security specialists and anyone who is interested in the development of cyber threats.

Let me personally thanks for the support all the members of the Threat Landscape Stakeholder Group, in particular the author of the report Louis Marinos, that coordinated us during the last year and that made possible the publishing of a so precious document.

Enjoy the report!

Pierluigi Paganini

(Security Affairs – ENISA Threat Landscape 2014, cyber threats)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

6 minutes ago

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

38 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

This website uses cookies.