• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Malware • Ransomware • Security  /  The Cyber Threat Landscape 2017
The Cyber Threat Landscape 2017
04 December 2017

The Cyber Threat Landscape 2017

Written by Seqrite
Seqrite
Cybersecurity, Malware, Ransomware, Security
2
Shares

Cyber threats are multiplying at an uncontrollable rate and 2017 hasn’t been any different. While global damages, concerning cybersecurity, are expected to surpass $5 billion by the end of this year, the actual predicament is the supposed yearly growth which is somewhere in the ballpark of 350 percent. If the condition isn’t nipped in the bud, these threats might lead to bigger issues in the subsequent years. Looking at the cyber threat landscape for 2017 gives us a fair idea regarding the expected threats, security incidents and other forms of cybersecurity crisis, waiting for us in 2018. The 2017 threat landscape enlists the major data breaches and ransomware attacks that took the global online domain by surprise and crippled several IT security networks.

WannaCry Attack

Probably the biggest ransomware attack of 2017, WannaCry created a lasting impression by plaguing 300,000 computers — spanning across 150 countries. WannaCry automatically encrypted the data  of the infected computers and demanded Bitcoin payments for the decryption key. The WannaCry ransomware leveraged a minor vulnerability within the Windows OS. Despite, Microsoft releasing the patch a few weeks before the attack, the malware crept in via systems which weren’t updated. The estimated financial loss due to WannaCry was close to $4 Billion globally.

Equifax Breach

One of the largest credit reporting firms, Equifax, encountered a massive breach that compromised the personal details of more than 145 million customers. The hackers exploited existing vulnerabilities and initiated attacks that possibly triggered personal identity theft. The most frightening aspect of this breach is that while the possibility of the attack was somewhat known to the company, it missed judging the magnitude of the impact and hence did not proactively correct the security lapse. The attack created massive outrage amongst people and caused the company CEO to resign.

NotPetya Crisis

Cybersecurity administrators encountered a Petya like vulnerability in July 2017, named NotPetya. While the initial impressions were similar to that of Petya, this malware went a step further and encrypted data of the infected systems. Although payments were demanded for the decryption key, NotPetya caused irreparable damage to the affected hard drives.

The Cloudbleed Bug

Initially discovered in February 2017, the Cloudbleed bug leaked user data by exploiting glitches within the CloudFlare database. However, this bug didn’t show up suddenly and was actually bothering the data subjects for the past six months before getting discovered. This bug primarily affected FitBit and Uber users.

Ethereum Heist

Our discussion regarding the 2017 cyberthreat landscape would be incomplete without mentioning a cryptocurrency heist. The Ethereum crisis involved breaking into one of the largest online cryptocurrency trading platform, CoinDash. The hacker hijacked the platform and stole more than $7 million worth of Ethereum.

The Infamous Game of Thrones Leak

A high-profile cybersecurity attack plagued the telecast of Game of Thrones where hackers kept leaking episodes and scripts. This incident took place in July and the attackers asked for money in return of at least 15 terabytes of stolen data. This leak was followed by another attack on HBO’s social media identity.

Read More: Encrypt your data or be hacked: Choice is yours

Breaching the Zomato Database

Indian company Zomato encountered a catastrophic cybersecurity breach where at least 17 million records were stolen. Based on the reports and surveys, the Zomato breach was the 6th largest global attack. For mitigating the risks and damages, Zomato asked the users to immediately change their login credentials.

Inference

While the first half of 2017 saw inordinate security meltdowns, the other half witnessed steps to mitigate the threats and minimize the encountered damages. Although the enlisted threats and cybersecurity attacks aren’t segregated chronologically, studying them can still help businesses stay vigilant in 2018. However, the nature of malware threats, ransomware attacks, data breaches, infiltrations and even security incidents are evolving with time and it is important that companies hire equipped security services providers like Seqrite for keeping up with the hackers.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostIcedID – a new sophisticated banking Trojan: a technical an...
Next Post  Unified Threat Management: Understanding the requirements as per ...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Lured and Compromised: Unmasking the Digital Danger of Honey Traps

    June 17, 2025
  • Operation Sindoor – Anatomy of a Digital Siege

    May 23, 2025
  • SnakeKeylogger: A Multistage Info Stealer Malware Campaign

    March 25, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies