Manage Pressing Risks with EPL-Risk.com

A one-stop hub for practical, timely and actionable insights, tools and training that may save thousands of dollars by minimizing potential loss exposures, human resources expenses, training costs, and attorney fees.

Today's Workplace

How Generative AI Is Allowing More Criminals To Go Into Cyber Crime

New research finds cyber attackers are using generative AI to write malware. We explain why the risk is more than just new and exotic social engineering schemes.

Continue reading

Create A Cyber Risk Management Plan Before There Is A Breach

Failing to assess and address cyber risks and vulnerabilities leaves your organization vulnerable to a ransomware attack. We examine.

Continue reading

Bad Actors Use Phishing Because It Still Works

An FBI report shows a record number of complaints received, and phishing tops the 2023 list. Learn about the importance of training.

Continue reading

"Search and Destroy" Malware Rises: What Best Practices Can Help Protect Organizations?

Malware designed to seek out and disable enterprise security defenses has surged in popularity over the past year to comprise 26 percent of all detections in 2023, according to cybersecurity vendor Picus Security's annual Picus Red Report 2024 which analyzed 612,080 malicious files last year.

The report suggests that cybercriminals are changing their tactics in response to the much-improved security of average businesses and the use of better tools offering far more advanced capabilities to detect threats.

A year ago, it was relatively rare for cybercriminals to disable security controls. Now, this behavior is used by almost every ransomware group and nation state.

This malware category, which increased in volume by 333 percent from 2022 to 2023, is characterized by taking legitimate anti-malware programs and converting them into tools to infect a system.

Overall, 70 percent of malware analyzed now employs stealth-oriented techniques. Moreover, there is a 150 percent annual increase in the use of a technique through which cybercriminals try to hide malicious activity to make detection of attacks, forensic analysis, and incident response more difficult for network defenders. Phil Muncaster, "Stealthy "Hunter-Killer" Malware Detections Surge 333 Percent Annually" infosecurity-magazine.com.com (Feb. 14, 2024)

Commentary

The ability to disable an anti-malware program and use it against the system it was designed to protect, all the while making it appear that the anti-malware program is working correctly, elevates cyberattacks to a new level.

One way to counter this type of threat is for organizations to employ even more sophisticated programs that can detect this type of "hunter-killer" malware. However, even entry-level users of a system have a role to play in defending against this type of infection.

The vast majority of this type of malware is delivered via invitation of users. Email and text messages remain the most common delivery method.

Selecting a link, downloading an attached file, or simply going to a website and divulging credentials because of an invitation from an unsolicited email or text is the most common way malware is introduced onto a system.

Training, education, and knowledge of social engineering techniques are the cornerstones of a solid network defense strategy.

Should prevention practices fail, employees must know whom to contact if they believe they are a victim of an attack. If possible, create a helpline or online chat line for employees who have cybersecurity questions. Encourage employees to ask first if they think an online action, response, or practice could be unsafe.

Finally, your opinion is important to us. Please complete the opinion survey: