Page 238 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 238

Phishing  &  Social  Engineering:  Sophisticated  methods  to  trick  cyber  victims  into  downloading
            malicious attachments or clicking on links that lead to malware infections are also becoming common.
            For instance: Phishing emails, made to look legitimate from trusted sources. Social engineering attacks
            on the other hand, come in many forms, like phone calls or instant messages manipulating the victim into
            giving up sensitive information or downloading malware.

            Compromised  Websites  &  Drive-bys:  Adversaries  exploit  website  code  vulnerabilities  to  serve
            malicious  content.  These  "drive-by"  techniques  silently  trigger  malware  downloads,  automatically
            downloading and installing malware onto a user’s system, often without their knowledge or consent.
            Reports suggest that a new organization will fall victim to Ransomware 2.0 attack every 10 seconds by
            the end of the decade.

            Malvertising: Cybercriminals are increasingly exploiting online advertising as a source for ransomware
            distribution. Malvertising campaigns often target high-traffic websites and use sophisticated techniques,
            such as “Watering hole” attack, where hackers compromise a legitimate website and inject malicious
            code into the displayed ads. Even SMBs, once considered low-value targets, now find themselves in the
            crosshairs of these indiscriminate digital threats.

            Malware Kits: Found on the dark web and often designed to be user friendly, these kits generally include
            tools, scripts, and other components that are packaged together to create custom malware. The kits often
            offer  built-in  obfuscation  techniques  to  avoid  detection  by  antivirus  software  such  as  firewalls  and
            intrusion detection systems.

            Infected File & Application Downloads: An attacker may distribute an infected version of a popular
            software or tool that appears legitimate, but when downloaded and installed, it executes the ransomware.
            This method can include disguising the files or applications as necessary updates, security patches, or
            even enticing software or media downloads. In some cases, attackers may also use file-sharing platforms
            or peer-to-peer (P2P) networks to distribute infected files or applications.

            Messaging & Social Media Impersonations: A common tactic often exploiting users’ trust and curiosity.
            It can often look like a direct message from a contact or a fake account that looks legitimate. In other
            cases, attackers disguise ransomware as harmless links or file attachments, such as a photo or a video,
            coming from a known source. It can also be disguised as scalable vector graphics (SVG) that, when
            opened, downloads a file that bypasses traditional extension filters.

            Brute Force Through RDP: Keeping passwords such as “password123” or “admin123? Threat actors
            try many password combinations until they discover the right one. Attackers often use this method to
            target remote desktop protocol (RDP) endpoints, typically found on servers or workstations that are used
            by employees to connect to a corporate network remotely.

            As  ransomware  threats  continue  to  evolve,  so  must  the  defenses  against  them.  Sentinel,  with  its
            advanced cybersecurity solutions, provides a robust line of defense against these sophisticated malicious
            attacks.









                                                                                                            238
   233   234   235   236   237   238   239   240   241   242   243