{"id":46115,"date":"2015-11-10T12:18:42","date_gmt":"2015-11-10T20:18:42","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=46115"},"modified":"2025-05-27T19:26:12","modified_gmt":"2025-05-28T02:26:12","slug":"2016-cybersecurity-predictions-report-examines-growth-integrity-attacks","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/","title":{"rendered":"2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks"},"content":{"rendered":"<p>Cybersecurity changes rapidly.\u00a0Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released the\u00a0<em>McAfee Labs 2016 Threats Predictions,<\/em> a report covering both cybersecurity predictions for the coming year as well as a five-year look forward at the changing security field.\u00a0Collectively, the report paints a picture of a growing technology landscape and the attackers who are maneuvering for an unfair advantage at the expense of others.<\/p>\n<p>I am honored to have contributed to this year\u2019s exercise, collaborating with a stellar group of experienced security experts.\u00a0Many of the predictions are logical extensions of current attacks, newsworthy events, or tied closely to the growth of technology.<\/p>\n<p>One prediction in particular may surprise people.\u00a0The growth of integrity attacks could be the unexpected shift that will fuel significant change in perspectives, expectations, and controls.<\/p>\n<p>Unlike denial-of-service attacks, which undermine the availability of entire systems, or data breaches, which steal confidential data, integrity attacks maliciously modify data or transactions.<\/p>\n<p>We have seen a number of cases in which attackers with financial motivations are undermining the integrity of data for their benefit.\u00a0These types of attacks can be very selective and discrete, making them extremely difficult to detect, prevent, and correct.\u00a0Perhaps most important, such maneuvers have generated an unexpectedly shocking amount of loss and victims angst.<\/p>\n<p>Banking infrastructure malware Carbanak, which was discovered in 2015, infected banks and selectively modified systems to create a small number of fraudulent transactions that fleeced hundreds of millions of dollars in a single coordinated campaign.<\/p>\n<p>In separate attacks, business victims have seen their email systems tampered with.\u00a0Fraudulent messages crafted from executives\u2019 accounts to accounts-payable departments instructed money transfers to be made immediately to a third party.\u00a0These messages were not actually from the executives, but rather from attackers who were able to gain administrative access to the communication tools and use them to send funds to entities they controlled.<\/p>\n<h2>Crypto-based Ransomware<\/h2>\n<p>Crypto-based ransomware is another example of an integrity attack. Consumers, businesses, and even government agencies have been victimized, with selected files of infected systems encrypted by the attackers and held for ransom.\u00a0The <a href=\"https:\/\/cyberthreatalliance.org\/\">Cyber Threat Alliance<\/a>, which includes McAfee, recently published a detailed analysis showing how one such ransomware, CryptoWall, is responsible for taking a staggering $325 million from its victims.<\/p>\n<p>Attacks designed to undermine the integrity of systems and data tend to create emotional distress in victims as they suffer from being targeted in a very personal way.\u00a0Their family pictures are held for ransom, emails with their addresses are forged, and select transactions from their companies are tampered with.\u00a0From a security perspective, the current generation of tools is not designed or optimized to protect from such attacks.\u00a0The resulting impacts may be enough to fundamentally change opinions and expectations of security.<\/p>\n<p>Overall, we at McAfee believe integrity-based attacks will continue to rise in 2016 and beyond, as they are proving lucrative for attackers and troublesome for defenders.<\/p>\n<p>To protect technology, users, data, and digital services, we all must understand the challenges we will face in the future.\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/\">Download the free report <\/a>and gain the insights of experts at McAfee.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity changes rapidly.\u00a0Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released the\u00a0McAfee&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4139,1814,76,180,214,18,4140],"coauthors":[4136],"class_list":["post-46115","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-annual-threats-predictions","tag-computer-security","tag-cybercrime","tag-malware","tag-mobile-security1","tag-network-security","tag-quarterly-threats-report"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Cybersecurity changes rapidly.\u00a0Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity changes rapidly.\u00a0Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-10T20:18:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T02:26:12+00:00\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks\",\"datePublished\":\"2015-11-10T20:18:42+00:00\",\"dateModified\":\"2025-05-28T02:26:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/\"},\"wordCount\":533,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"Annual Threats Predictions\",\"computer security\",\"cybercrime\",\"malware\",\"mobile security\",\"network security\",\"Quarterly Threats Report\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/\",\"name\":\"2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2015-11-10T20:18:42+00:00\",\"dateModified\":\"2025-05-28T02:26:12+00:00\",\"description\":\"Cybersecurity changes rapidly.\u00a0Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks | McAfee Blog","description":"Cybersecurity changes rapidly.\u00a0Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks | McAfee Blog","og_description":"Cybersecurity changes rapidly.\u00a0Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-11-10T20:18:42+00:00","article_modified_time":"2025-05-28T02:26:12+00:00","author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks","datePublished":"2015-11-10T20:18:42+00:00","dateModified":"2025-05-28T02:26:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/"},"wordCount":533,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["Annual Threats Predictions","computer security","cybercrime","malware","mobile security","network security","Quarterly Threats Report"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/","name":"2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2015-11-10T20:18:42+00:00","dateModified":"2025-05-28T02:26:12+00:00","description":"Cybersecurity changes rapidly.\u00a0Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=46115"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46115\/revisions"}],"predecessor-version":[{"id":214475,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46115\/revisions\/214475"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=46115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=46115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=46115"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=46115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}