">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Tuesday, January 19, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Columnists

Sophos 2019 Threat Report unveils the rise of targeted cyberattacks as criminals stalk victims to bank millions

Milcah Lukhanyu by Milcah Lukhanyu
2 years ago
in Columnists
8 min read
0

 

 

Sophos today launchedits 2019Threat Report providing insights into emerging and evolving cybersecurity trends. The report, produced by SophosLabs researchers, explores changes in the threat landscape over the past 12 months, uncovering trends and how they are expected to impact cybersecurity in 2019.

“The threat landscape is undoubtedly evolving; less skilled cyber criminals are being forced out of business, the fittest among them step up their game to survive and we’ll eventually be left with fewer, but smarter and stronger, adversaries. These new cybercriminals are effectively a cross-breed of the once esoteric, targeted attacker, and the pedestrian purveyor of off-the-shelf malware, using manual hacking techniques, not for espionage or sabotage, but to maintain their dishonorable income streams.” – Joe Levy, CTO, Sophos, as referenced in the SophosLabs 2019 Threat Report

The SophosLabs 2019 Threat Report focuses on these key cybercriminal behaviours and attacks:

  1. Capitalist cybercriminals are turning to targeted ransomware attacks that are premeditated and reaping millions of dollars in ransom – 2018 saw the advancement of hand-delivered, targeted ransomware attacks that are earning cybercriminals millions of dollars. These attacks are different than ‘spray and pray’ style attacks that are automatically distributed through millions of emails. Targeted ransomware is more damaging than if delivered from a bot, as human attackers can find and stake out victims, think laterally, trouble shoot to overcome roadblocks, and wipe out back-ups so the ransom must be paid. This “interactive attack style,” where adversaries manually maneuver through a network step-by-step, is now increasing in popularity. Sophos experts believe the financial success of SamSam, BitPaymer and Dharma to inspire copycat attacks and expect more happen in 2019.
  2. Cybercriminals are using readily available Windows systems administration tools – This year’s report uncovers a shift in threat execution, as more mainstream attackers now employ Advanced Persistent Threat (APT) techniques to use readily available IT tools as their route to advance through a system and complete their mission – whether it’s to steal sensitive information off the server or drop ransomware:
  3. Turning admin tools into cyberattack tools
    In an ironic twist, or Cyber Catch-22, cybercriminals are utilising essential or built-in Windows IT admin tools, including Powershell files and Windows Scripting executables, to deploy malware attacks on users.
  4. Cybercriminals are playing Digital Dominos
    By chaining together a sequence of different script types that execute an attack at the end of the event series, hackers can instigate a chain reaction before IT managers detect a threat is operational on the network, and once they break in it’s difficult to stop the payload from executing.
  5. Cybercriminals have adopted newer Office exploits to lure in victims
    1. Office exploits have long been an attack vector, but recently cybercriminals have cut loose old Office document exploits in favour of newer ones.
  6. EternalBlue becomes a key tool for cryptojacking attacks
    1. Patching updates appeared for this Windows threat more than a year ago, yet the EternalBlue exploit is still a favourite of cybercriminals; the coupling of EternalBlue to cryptomining software turned the activity from a nuisance hobby into a potentially lucrative criminal career. Lateral distribution on the corporate networks allowed the cryptojacker to quickly infect multiple machines, increasing payouts to the hacker and heavy costs to the user.

The continued threat of mobile and IoT malware – Malware’s impact extends beyond the organization’s infrastructure as we see the threat from mobile malware grow apace. With illegal Android apps on the increase, 2018 has seen an increased focus in malware being pushed to phones, tablets and other IoT devices. As homes and businesses adopt more internet-connected devices, criminals have been devising new ways to hijack those devices to use as nodes in huge botnet attacks. In 2018, VPNFilter demonstrated the destructive power of weaponized malware that affects embedded systems and networked devices that have no obvious user interface. Elsewhere, Mirai Aidra, Wifatch, and Gafgyt delivered a range of automated attacks that hijacked networked devices to use as nodes in botnets to engage in distributed denial-of-service attacks, mine cryptocurrency and infiltrate networks.

 

READ  KeepKey Launches Native ERC-20 Token Support

Related posts

Avoid Biggest Mistakes Often Made By New Poker Players

January 18, 2021
0

Growing Kenyan entrepreneurship – the digital programmes and projects that are shaping the future

January 13, 2021
0

5 Ways to Make Your Office Space Appear More Professional

December 21, 2020
0

Common VPN myths debunked

December 18, 2020
0
Readers 1,657

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

Columnists

Avoid Biggest Mistakes Often Made By New Poker Players

January 18, 2021
0
Columnists

Growing Kenyan entrepreneurship – the digital programmes and projects that are shaping the future

January 13, 2021
0
Columnists

5 Ways to Make Your Office Space Appear More Professional

December 21, 2020
0
Columnists

Common VPN myths debunked

December 18, 2020
0
Columnists

Best File Recovery Software for macOS Big Sur

December 14, 2020
0
Bitcoin

How Online Gaming Is Pushing a Wider Bitcoin and Crypto Adoption

December 14, 2020
0
Columnists

2021 Upcoming Mobile Games

December 14, 2020
0
Columnists

BOC 3 Filing Process in the Transportation Industry

December 14, 2020
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

pregnant woman kenyan

Nakuru County Has Introduced Smart Watches That Will Monitor Expectant Mother

January 19, 2021
uhuru

Here’s Why Facebook Flagged Uhuru’s Congratulatory Message To Museveni

January 19, 2021
digital marketing seo

6 Things A Digital Marketing Report Should Contain

January 19, 2021

Top Graphic Design 2021 Predictions

January 19, 2021

A Non-Profit American Organization Is Demanding For Telegram To Be Removed From The Apple Store

January 19, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: