TechBizWebTechBizWeb

    Subscribe to Updates

    Get the latest news about Technology and Business from all around the web..

    What's Hot

    Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

    November 7, 2022

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022
    Facebook Twitter Instagram
    • About Us
    • Privacy Policy
    • Guest Post
    • Terms
    • Contact
    Facebook Twitter Instagram
    TechBizWebTechBizWeb
    Subscribe
    • Home
    • Technology

      Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

      November 7, 2022

      Devialet brings its sci-fi design aesthetics to a $790 portable speaker

      November 7, 2022

      Elon Musk’s response to fake verified Elon Twitter accounts: a new permanent ban policy for impersonation

      November 7, 2022

      The iPhone 14 Pro and Pro Max will come with ‘longer wait times’ due to factory lockdown

      November 6, 2022

      Meta’s reportedly planning to lay off ‘thousands’ of workers this week

      November 6, 2022
    • Business
    • Cyber Security
      National Security News

      List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

      September 24, 2022

      Cybersecurity ranked most serious enterprise risk in 2022

      August 31, 2022

      Registration open for CISA virtual summit on K-12 school safety

      August 31, 2022

      What do the Trickbot leaks reveal about Russian cybercrime?

      August 31, 2022

      What cybersecurity measures do CISOs outsource?

      August 30, 2022
    • Blockchain
    • Vulnerabilities
    • Social Engineering
    • Malware
    • Cyber Security Alerts
    TechBizWebTechBizWeb
    Home»Cyber Security»How Cybercriminals Blend into the Background –
    Cyber Security

    How Cybercriminals Blend into the Background –

    January 29, 2019Updated:January 29, 2019No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Maintaining protection over an enterprise’s critical data, systems and assets is a continual uphill battle. Not only are chances good that the business’s digital footprint is growing through new applications, but hackers are also constantly bolstering their capabilities to silently breach platforms and maintain a presence under the radar of the IT team.

    In the past, hackers have utilized all types of tactics to cover their tracks and enable them to remain within legitimate systems and steal data for more extended periods of time. And, according to a new report from Trend Micro researchers, these tactics are only growing more sophisticated, advanced and dangerous.

    One of the best ways to improve the company’s security posture is to inform proactive protection by learning about the enemy. Today, we’re taking a look at the different techniques cybercriminals use to blend in and prevent detection. With this knowledge, IT teams can keep a more watchful eye out for the types of activity that can point to a malicious breach.

    How do hackers cover their tracks?

    Just as hunters work hard to remain hidden from their prey, so too do hackers do everything in their power to avoid detection by human users and network- and application-level security solutions.

    As Trend Micro researchers explained in the recent report, “Mapping the Future: Dealing with Pervasive and Persistent Threats,” the practice of blending into legitimate traffic within enterprise systems will only become more prevalent and threatening.

    “In response to security vendor technologies, specifically the renewed interest in machine learning for cybersecurity, cybercriminals will use more malicious tactics to ‘blend in,” researchers noted in the report. “New ways of using normal computing objects for purposes other than their intended use or design – a practice known as ‘living off the land’ – will continue to be discovered, documented and shared.”

    So far, researchers have observed the rising use of a few key strategies in the current threat landscape, including:

    • Masking activity with unconventional file extensions. Much of today’s malicious code is no longer being delivered through the traditional executable file, as users have been trained to be suspicious of these types of programs. Now, hackers are packaging their malicious code in less recognizable formats, using extensions like .URL, .IQY, .PUB and .WIZ. This makes it easier for hackers to trick users into opening malicious files and launching a successful infection.
    • Minimal modification. Hackers quickly catch on to the types of activity that users and security programs classify as suspicious, including the modification of legitimate files to spur a breach an infection. In response, cybercriminals are scaling back on their modifications and only changing the bare minimum in order to leverage a legitimate file or system as a launch pad for their attack.
    • New activation methods. In addition, cyberattakers are also switching up their malware activation strategies, using techniques like Mshta, Rundll32, Regasm, Regsvr32 and more.
    • Digitally signed malware. As Trend Micro researchers noted in the report, digitally signed malware is already a pervasive approach used by hackers, and will only continue to pose a significant threat. This technique is highly effective. It enables hackers to make their well-hidden malware even more legitimate-appearing thanks to a digitally signed certificate that enables the bypass of security platforms.

    “Hackers use compromised code signing certificates associated with trusted software vendors in order to sign their malicious code, reducing the possibility of their malware being detected on targeted enterprise networks and consumer devices,” The Hacker News contributor Swati Khandelwal explained.

    Fileless malware

    In addition to the above-described tricky strategies, hackers are also increasing their use of fileless malware, which can improve hackers’ chances of flying under the radar of traditional file scanning solutions. As noted in this Trend Micro Simply Security blog, fileless malware seeks to take advantage of software or system vulnerabilities while preventing attackers from catching the attention of users or raising security notifications.

    One example of this type of advanced threat exploits the PowerShell utility, or other Microsoft Word macros to execute a hidden command against the victim system. These commands can change depending on the hacker’s goal or the length of time they’re attempting to remain within the breached system.

    “Current security solutions detect an intrusion [using] a signature based on the malware file’s characteristics,” Trend Micro researchers explained. “However, because fileless malware doesn’t have a payload file to infect a system, security applications don’t know what to look for.”

    This makes fileless malware samples particularly dangerous and especially difficult – but not impossible – to detect.

    Hidden tunnels

    In a report for The Wall Street Journal, contributor Adam Janofsky described the rising use of so-called “hidden tunnels,” which allow hackers to ride the coattails of legitimate business application traffic and protocols to make off with stolen data. Currently, this threat presents the most risk for financial organizations, where hackers can utilize tunnels to sneak past access control protections and intrusion detection solutions. However, the use of hidden tunnels can pose a threat to businesses in any industry.

    “These tunnels work by blending in with legitimate applications that connect a company’s network to outside systems, such as third-party analytics tools, cloud-based financial applications and stock ticker feeds,” Janofsky wrote.

    Once hackers enter a system, they can then steal considerable amounts of sensitive data and intellectual property, using additional tactics to cover their tracks. As opposed to stealing large files, hackers will break information down into smaller chunks that are less likely to set off alarms within an enterprise’s security solutions.

    According to a report from Ventra Networks Inc., there are more hidden tunnels than one might expect. Researchers found that within the financial sector alone, approximately 23 tunnels, disguised through encryption, exist for every 10,000 devices. In other industries, there are only about 11 tunnels for every 10,000 devices.

    Avoiding detection to ramp up data theft and damage

    One of the biggest motivations for avoiding detection using these types of cybercriminal tactics is to support a longer and more drawn-out data breach. As Janofsky explained, such was the case with the Equifax Inc. breach – hackers purposely avoided using specific tools and tactics which would draw the attention of internal security stakeholders and protection programs. This enabled attackers to remain within the company’s systems for over four months.

    Hackers’ ability to cover their tracks poses a significant threat to organizations in every industry. The ideal response to this level of threat environment is to work proactively, become aware and educated about the strategies hackers leverage, and look to guard against these activities specifically.

    To find out more about informing your security posture with the latest security strategies, connect with the experts at Trend Micro today.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    National Security News

    List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

    September 24, 2022 Cyber Security

    Cybersecurity ranked most serious enterprise risk in 2022

    August 31, 2022 Cyber Security

    Registration open for CISA virtual summit on K-12 school safety

    August 31, 2022 Cyber Security

    What do the Trickbot leaks reveal about Russian cybercrime?

    August 31, 2022 Cyber Security

    What cybersecurity measures do CISOs outsource?

    August 30, 2022 Cyber Security

    SIA announces Women in Security Forum scholarship recipients

    August 30, 2022 Cyber Security
    Editors Picks

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022

    Google Cloud Says Running Validator on Solana Blockchain

    November 7, 2022

    European stocks rise as investors boosted by China speculation

    November 7, 2022
    Trending Now

    Evergrande creditors sell ‘Versailles mansion’ plot in Hong Kong

    By techbizweb

    OpenSea Creates Tool for NFT Creators to Enforce Royalties On-Chain

    By techbizweb

    FTSE chairs warn of declining relations with institutional investors

    By techbizweb

    https://www.nationalsportsacademy.com

    slot gacor hari ini

    http://www.inadesfo.org/

    http://www.eueomgbissau.org/

    http://www.congo-mai-mai.net/

    http://www.angelesdelafrontera.org/

    http://fifaworldcup2018schedule.com/

    http://tony4gtrmcr.co.uk/

    http://www.standrewsagreement.org/

    http://www.bob-russell.co.uk/

    http://davidmulholland.co.uk/

    http://railwayhotelenniskillen.com/

    http://www.fantasysportstrades.com/

    http://www.rainleaf-flooring.com

    http://mothersagainstguns.org/

    http://ma-coc.org/

    slot online

    http://www.paradoxmag.com/situs-judi-slot-online-gampang-menang-2021/

    http://www.paradoxmag.com/situs-judi-slot-online-terbaru-2021/

    http://slot-terbaru.net/

    Slot Gacor

    Slot Online

    Situs Slot Gacor

    http://www.appdexterity.com/

    https://cars4kids-deutschland.de/

    https://www.stretchingculture.com/

    https://www.b-123-hp.com/slot-gacor/

    https://denzstaffing.nl/

    https://ezbbqcooking.com/slot-gacor/

    https://www.mbahelp24.com/slot-gacor

    https://minhtanstore.com/slot-jackpot-terbesar/

    https://njbpusupplierdiversity.com/slot-gacor-gampang-menang/

    https://www.floridaspecialtycropfoundation.org/slot-gampang-menang/

    https://childrenscornerpreschool.org/slot-gacor-gampang-menang/

    https://cryptoquoter.com/slot-online-terbaik/

    https://alorkantho24.com/slot-gacor/

    https://ellas.xyz/slot-gacor/

    https://it.dougamatome.xyz/slot-online/

    https://www.daltercume.com/slot-gacor/

    https://josi-ana.dougamatome.xyz/slot88/

    https://josi-ana.dougamatome.xyz/slot-gacor/

    https://fastobserver.com/slot-jackpot-terbesar/

    https://www.planetexperts.com/slot-gacor/

    https://bfsolution.group/slot-bet-kecil/

    https://rustleva.co/slot/

    https://bfsolution.group/slot-bet-kecil/

    https://www.hotelcalimareal.com/togel-online/

    https://anime-game.dougamatome.xyz/slot-gacor-gampang-menang/

    https://anime-game.dougamatome.xyz/togel-online/

    https://bourbonbarrelfoods.com/slot/

    http://suneo39.wp.xdomain.jp/slot/

    https://techbizweb.com/slot-gacor/

    https://www.generalcatalyst.com/18-daftar-slot-gacor-terbaik-gampang-menang-jackpot-hari-ini/

    https://www.hotelcalimareal.com/slot-online/

    https://www.blockgates.io/slot-gacor/

    https://l12.com.br/slot-gacor/

    slot paling gacor

    https://www.donalds-hobby.com/slot-online/

    https://thecryptodirt.com/slot-gacor-hari-ini/

    http://iseta.edu.ar/aulavirtual/app/upload/users/1/1205/my_files/sbobet.html

    http://escuelavirtual.mincit.gov.co/app/upload/users/1/194/my_files/slot.html

    https://www.dev.medecinesfax.org/courses/JUDICASINO/document/slot.html

    http://www.e-archivos.org/cursos/courses/JUDICASINO/document/slot-gacor.html

    http://iesma.com.br/ead/main/upload/users/4/447/my_files/slot.html

    https://www.fundacoop.org/chamilo/app/upload/users/1/1185/my_files/slot.html

    https://fata-aatf.org/eskola/main/upload/users/3/31/my_files/slot.html

    https://uancv.edu.pe/ofinvestigacion/app/upload/users/3/328/my_files/slot-terlengkap.html

    https://micost.edu.my/EL/app/upload/users/2/209/my_files/slot-gacor.html

    https://www.academiacoderdojo.ro/elearningdev/app/upload/users/2/2442/my_files/slot-online.html

    http://campus-cidci.ulg.ac.be/courses/JUDICASINO/document/slot-termurah.html

    https://www.escueladerobotica.misiones.gob.ar/aula-ste/courses/LIVECASINO/document/slot-tergacor.html

    http://ccdipeepccqqfar.usac.edu.gt/chamilo/app/upload/users/3/358/my_files/slot-online.html

    https://cunori.edu.gt/campus/app/upload/users/7/7334/my_files/slot-online.html

    http://u-rus.com.ar/aula/app/upload/users/1/1322/my_files/slot.html

    http://icrodarisoveria.edu.it/chamilo/app/upload/users/1/1855/my_files/slot.html

    https://iestpliliagutierrez.edu.pe/clarolgm/courses/CASINO/document/slot.html

    http://pva.cobach.edu.mx/app/upload/users/7/7379/my_files/slot.html

    http://www.imb-pc-online.edu.gt/PL/app/upload/users/3/373/my_files/slot.html

    http://avcs.upeu.edu.pe/main/upload/users/3333/my_files/slot.html

    https://chamilo.fca.uas.edu.mx/app/upload/users/1/11186/my_files/slot-online/

    TechBizWeb
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Guest Post
    • About Us
    • Privacy Policy
    • Our Authors
    • Terms and Conditions
    • Contact
    © 2023 Tech Biz Web. Developed by Sawah Dev.

    Type above and press Enter to search. Press Esc to cancel.