7 Malware Reports In 3 Days

Jan 25, 2018 | Security-GRC | 0 comments

Hackers are creating new forms of malware on a daily basis. In fact, 250,000 new malicious programs are registered by AV-Test every day. Large and small companies alike are at risk.

Think of it this way. There is an army of mass-produced cyber weapons and there is no stopping the production. All you can really do to save yourself and your data is to be prepared.

These new malicious programs are being produced at such a rapid pace a quick Google search turned up these new malware specimens within the three days!

  1. Right in our backyard, Stark County physician offices were out for days unable to access patient data or billing information due to a ransomware attack on their electronic health record vendor, Allscripts. A proactive plan would have kept their business open and would have allowed them to see ill patients.
  2. A new malware can intercept your emails, social media messages, and even WhatsApp messages. And it’s not just hackers using the malware: Your local law enforcement could be using it as a forensics tool.
  3. This new form of malware is targeting universities, government organizations and private companies and is even able to bypass technical security means and deceive people. It will attempt to turn off operating-system defenses while also hiding from antimalware tools in various sophisticated ways which almost makes this form of malware lethal compared to other forms of malware attacks.
  4. Quick cash sounds amazing, right? Hackers think so too. This new strand of malware uses the allure of quick wealth through cryptocurrency to trick unsuspecting users to download malware.
  5. Skygofree is giving the bad guys free rein on your Android – basically like having a spy peek into pretty much any and all information on your smartphone. They can even turn on your microphone to eavesdrop.
  6. If new species aren’t enough, new vehicles to deliver malware are popping up. If you come across a PDF version of the book “Fire and Fury” don’t be surprised if malware infects your PC immediately after.
  7. Cryptocurrency Monero is literally gold for hackers. They’re using the cryptocurrency and its popularity to upload malware to Monero-mining software and well-known file sharing sites.

The cybercrime industry is obviously going through a growth spurt and so is the end user. The end user is learning as each new threat emerges. As we grow and learn to protect ourselves, keep in mind there is never one answer to solving the malware problem. It will always be a combination of using software, staying educated, and deploying common security tactics on every system you use today. Criminals are unable to profit from their efforts without victims. If we can reduce how many possible victims there are through knowledge and software development, then these new malware programs won’t live for long. Large and small companies can avoid each and every species with the right blend of expertise, tools, and approach.

Here are some tips we learned along the way:

  • There’s no silver bullet to protection. You need a strategy. A good endpoint protection strategy includes profiling the environment to assess defenses and vulnerabilities so you know what’s coming. Hunt it. Kill it. Remediate it.
  • Remediation is an important piece of the puzzle. With a good virus and/or malware solution, you can remove the infection and all related artifacts so you’re left with a clean slate.
  • Don’t go to battle alone. ASMGi has over a decade of experience and can help all along the way. From helping you choose the best security solutions to managing your security 24/7. We’ll be your solution end to end.

If that’s not enough, try Malwarebytes for 30 days to get started on the path to a good strategy.

View/Add comments


<script type="text/javascript" src="//platform.linkedin.com/in.js"></script><script type="in/share" data-counter="top"></script> <a href="https://twitter.com/share" class="twitter-share-button" data-via="ASMGi_CLE">Tweet</a> <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^https:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+'://platform.twitter.com/widgets.js';fjs.parentNode.insertBefore(js,fjs);}}(document, 'script', 'twitter-wjs');</script>

Navigate the blog