Sandboxing is a practice often employed by security technology to separate running programs and applications so that malicious code cannot transfer from one process (i.e., a document reader) to another (i.e., the operating system). Several vendors, including Adobe and Apple, have taken this approach and more are likely to follow. As this technology gets put in place, attackers are naturally going to try to circumvent it.
FortiGuard Labs has already seen a few exploits that can break out of virtual machine (VM) and sandboxed environments, such as the Adobe Reader X vulnerability. The most recent sandboxing exploits have either remained in stealth mode (suggesting that the malware code is still currently under development and test) or have actively attempted to circumvent both technologies. Next year, they expect to see innovative exploit code that is designed to circumvent sandbox environments specifically used by security appliances and mobile devices.
Fortinet, a leader in high-performance network security, recently revealed FortiGuard Labs' 2013 threat predictions, highlighting six threats to watch out for next year. Expected trends include mobile advanced persistent threats, IPv6 safe havens and exploits through machine-to-machine communications.