How to Accidentally Stop a Global Cyber Attacks

A fresh wave of infected emails is swirling around the globe, carrying a nasty ransomware payload.

So finally I’ve found enough time between emails and Skype calls to write up on the crazy events which occurred over Friday, which was supposed to be part of my week off (I made it a total of 4 days without working, so there’s that). You’ve probably read about the WannaCrypt fiasco on several news sites, but I figured I’d tell my story.

https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attack

Advertisement

Nasty Trojan Spreads Global Ransomware via Email

A fresh wave of infected emails is swirling around the globe, carrying a nasty ransomware payload.

ESET is warning of an increased number of infected emails containing a malicious attachment, which downloads and installs ransomware onto an infected device. ESET telemetry detects this malicious downloader as JS/TrojanDownloader.Nemucod and records its unusually high incidence in Europe, North America (especially Canada), Australia and Japan.
http://www.infosecurity-magazine.com/news/nasty-trojan-spreads-global/?utm_content=bufferc86f5&utm_medium=social&utm_source=linkedin.com&utm_campaign=buffer

2013 PREDICTIONS: Security Threats to Business, the Digital Lifestyle, and the Cloud

At Trend Micro CTO, the research team has once again evaluated 2012 risks and compiled the top threats for mid-sized firms in 2013. This assessment leverages the analyses of 1,000 threat researchers across the globe at Trend Micro. In 2013, managing device security, systems and networks will be more complex than ever before for mid-sized firms.

Organizations require a custom defense to protect intellectual property and business information as they embrace consumerization, virtualization, and cloud platforms. Cybercriminals and other threat actors will capitalize on risks to gain profit, steal information, and sabotage operations. Medium businesses are not immune and have assets and intellectual property hackers desire.
Here’s a sneak peek at a few of the threat predictions for 2013:

• Targeted attacks increase in sophistication.
• Volume of malicious Android apps hit 1 Million.
• Data breaches will remain a risk.
• Security threats will arise in unexpected places.

READ ALL 10 PREDICTIONS FOR 2013

2010 was quite a year in SEO Services! Don’t expect 2011 to slow down.

Bookmark and Share Published Thursday, December 30, 2010 9:41 PM by Patrik Runald

With regard to affordable SEO services, or search engine optimization for web site ranking, 2011 will bring an entirely new set of threats designed to strip organizations of confidential information and exploit users. Leading the charge will be a series of blended threats…

First, expect Stuxnet sequels. Because it takes a substantial amount of time to develop advanced persistent threats like Stuxnet, we predict similar exploits will be carried out once or twice in 2011.

Second, companies will struggle to stay secure while covering more ground. Today’s threats continue to morph based on where/how companies do business. Blended threats (like Zeus and SpyEye) will continue to evolve and use a variety of delivery methods. Malicious content is no longer binary files delivered in attachments; it is script-based or embedded within rich media. As our previous Insights post referenced, many threats spread rapidly through social media. This is going to continue be a challenge as 13 percent of all Web traffic is going to Facebook and this number continues to increase as more businesses use social media.

While many cybercriminals are nearly 100 percent focused on stealing corporate data to make money – most IT professionals don’t have the bandwidth to personally secure every Web page and email employees use. 52 percent of data-stealing attacks were conducted over the Web and another nine percent happened over email last year.

In 2011, strained IT departments will need to defend more territory and allow more Web access, despite increasingly sophisticated threats. Cybercriminals know that legacy technology simply looks for the signature or reputation of threats that are known, which is why they are so successful at exploitation.

And finally, we anticipate malware exploit kits will add zero-day vulnerabilities faster, increasing their use in drive-by download attacks. As more targeted attacks are researched, more zero-day vulnerabilities will be discovered. Blended threats are ever-evolving and tested by cybercriminals on anti-virus before they are released. Our research also showed the prevalence of the threats currently out there. Users of the top 1,000 sites are only two clicks away from malware at any given time. And, we saw a 111.4% increase in the number of malicious websites from 2009 to 2010.

The reality is security needs to be designed for the way we do business. Data loss prevention and up-to-the-minute threat protection will become increasingly more important as organizations work to keep malicious content out and corporate information in your affordable SEO services.

To see our Websense Security Labs recap of 2010, please visit http://www.websense.com/content/threat-report-2010-introduction.aspx