Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Cyber Attacks Spreading Malicious Software to Rise During 2018

 

According to one new report by Cisco, malware attacks are set to rise during the forthcoming months worldwide. Malware, which in full notation is malicious software, implies different kinds of destructive else intrusive software such as PC viruses, worms, scareware, adware, spyware, ransomware, Trojan horses as well as other forms of malicious programs.

 

Malware or malicious software is really the creation of cyber attackers who intend to acquire admission into a standalone PC else network alternatively causes destruction to either, usually as the victim stays unaware of his system's compromise. The computer virus is a common term used to describe malware.

 

Cisco in its 2018 Cyber Security Report advises computer operators to prepare for encountering newer, network-based, self-propagating malware during the current year. A relatively new malware that mines crypto-currencies attacks in the guise of ordinary JavaScript, most commonly some ad banner designed for grabbing victim's CPU energy for helping cyber attacker mine digital coins. Cyber mining malware sometimes works like ransomware too, hooking onto a mining device that it locks immediately on completing the task of mining. Prnewswire.com posted this on the Web dated February 28, 2018.

 

One kind of crypto-worm ransomware, WannaCry proliferated wildly all over the Internet. For its proliferation, WannaCry exploited the EternalBlue vulnerability in Microsoft Windows. The malware churned revenue amounting over USD 143,000 worth of Bitcoins. The original payment of bitcoin inside digital wallets was at USD 93,531.

According to the threat researchers at Cisco, a computed 312 ransom deposits had been done. Comparatively, the Angler exploit toolkit earned approximately USD 100m per annum in worldwide business.

 

Cisco notes an increase in malware sophistication following adversaries weaponizing cloud services as well as eluding detection via the process of encryption utilized like certain tool for covering up activities of command-and-control (C&C) systems.

 

Cisco in its report delineates a few recommendations for PC operators such as abiding by the rules and practices of corporate houses with regard to system, applications as well as appliance patching; while also use timely, and exact processes and data of threat intelligence for letting such data get included during security monitoring.

» SPAMfighter News - 3/8/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next