Beware The Latest Malware

Malware is one of the most well-known cyber threats, defined as a blanket term for computer programs used to damage a computer or network and gain access to sensitive information. Malware has been around for a long time, but it is still a major problem for businesses – around half of all organisations suffered a malware attack against company-owned devices in the last year. 

And in 2020, the use of malware by cybercriminals is growing. The malware strains have begun to use more sophisticated techniques and in some cases, they can even evade traditional signature-based defences; at present antivirus solutions are only able to block just over 40% of malware attacks.

Additionally, malware is expanding its field of targets and is now being used against mobile phones and smart devices. 

Perhaps even more worrying is the rise of malware-as-a-service, which has seen criminals develop ‘affiliate programmes’ that engage people with little to no cyber hacking skills to extort money from victims. This means that businesses need to start taking malware much more seriously, and put in resources and investment to defend themselves against the latest malware threats across the world. Protecting your company now means going far beyond relying on antivirus and firewall software. 

Attacks are more damaging than ever before
If you are still not convinced by the need to take malware more seriously, the first thing to note is that the severity of malware attacks is increasing. Organisations affected by malware can suffer extensive damage – not only financially but also to their reputation.

One key example is currency exchange bureau Travelex which recently lost control of its IT systems and customer data in a malware attack. The cybercriminals involved then demanded a ransom of $3 million to restore services. 
It is also worth noting that it is not just businesses that are targeted with malware. In 2019, in excess of 70 state and local governments in the US suffered ransomware attacks. 

How malware spreads
Malware is able to spread extremely rapidly – and this is partly due to the fact that it is spread in a variety of different ways. Some of the most common occur as phishing attacks – where unsuspected users are tricked into opening an application or website in an email. It is also common for criminals to use so-called software subversion, where they infect applications and software that is used by web developers, rather than websites or networks directly. 
Malware can also be spread by hackers who gain access to a network and then control it remotely. And there are even examples of employees and other insiders taking a bribe from cybercriminals in order to plant malware in a network. 

Latest malware threats to be aware of
Malware can take many different forms, and some of the most well-known of the latest malware threats include:

  • Ryuk - this is a sophisticated ransomware that infiltrates a system and then encrypts the data stored on it, making it unusable. A message is then displayed informing the user of these facts and demanding payment in the form of Bitcoin in order to get the files decrypted.
  • Trickbot - this is a banking trojan that is used to target small and medium-sized businesses – it is used to steal personal information in order to conduct identity fraud.
  • Emotet - another banking trojan which has evolved into a threat-delivery service. It is distributed through spam emails that are designed to look like legitimate emails.
  • Dridex - this is another form of malware that can evade traditional defences and specialises in the theft of online banking credentials.

How to protect your business against malware
While traditional defences alone are ineffective against these newer malware threats, there are thankfully many things that you can do to protect your business against them. The first thing to note here is that systems should be regularly patched, and vulnerability scans should be carried out in order to identify systems and applications at risk. 

Signature-based and behavioural-based detection technologies also have a role to play. Endpoint detection and response tools monitor user behaviour in the system in order to detect the latest types of malware – this allows them to disrupt and mitigate attacks. These tools are complex and time-consuming to manage however, and many businesses prefer to make use of managed endpoint detection and response services

There are also some best practice steps you should take to keep your business secure, such as keeping data regularly backed up to multiple sources on and off-site, utilising multi-factor authentication when users login to accounts, as well as providing training to employees about the risks of the latest threats. 

Chester Avey is an independent business consultant.     

You Might Also Read: 

Is The Cloud Skills Gap A Problem?

 

 

 

« Cyber Security Market Slowdown Blamed On Coronavirus
CISO's Cant Find The Right People »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

C2B2 Consulting

C2B2 Consulting

C2B2 are experts in middleware support and consultancy. We specialise in ensuring scalability, performance and security of large scale systems.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.

Suffescom Solutions

Suffescom Solutions

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

Cybalt

Cybalt

Cybalt is a security services company that provides end-to-end security solutions to help clients achieve their business goals.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.