Endpoints are the point of entry into your environment, your data, your credentials, and potentially your entire business. A compromised endpoint provides everything an attacker needs to gain a foothold on your network, steal data, and potentially hold it for ransom. Unless you protect your critical endpoints (including servers, laptops, and desktops), you may be leaving the front door wide open for attackers.
There is a new ransomware Trojan on the loose that is reportedly capable of disabling industrial control systems. Security researchers at Otorio, a Tel Aviv-based cybersecurity company, report that the origin of the malware, dubbed Snake, is most likely Iran. The new ransomware has caused havoc in the past two weeks and led to a spike in the number of reported cases.
Hackers are using advanced obfuscation techniques to embed malware in music files. According to Cylance, strains of malware have been found embedded in WAV audio files. They appear uncorrupted and play just fine, although some generate static noise.
Once the files are downloaded or opened, malicious code containing the XMRig Monero CPU miner is executed. The malware is reported to consist of two main components, a Least Significant Bit (LSB) stenography code, and decoders to execute the worm.
After sharp spikes in ransomware attacks in recent years, the total number of incidents is trending downward in 2018. But that’s not necessarily good news because these attacks also are becoming more targeted and potentially more dangerous.
Cryptomining malware has exploded on the threat landscape, becoming one of the most common malware attacks and posing a significant risk to your IT assets. Here are the answers you need: what it does, how it gets in, and how to recognize and prevent it.
First, the basics: Cryptomining is the process of validating a block of cryptocurrency transactions and adding them to the blockchain digital ledger. Miners compete against each other to validate a block of transactions using a proof-of-work algorithm that requires solving a complex mathematical problem. The successful miner for any given block receives newly “mined” cryptocurrency as a reward.
It’s big business. Digiconomist estimates annual global revenues of almost $7 billion, most of it earned by legitimate players using their own processing resources – often purpose built.