8.7 C
London
Wednesday, September 20, 2017
Home Tags Cybercriminals

Tag: cybercriminals

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code.

At Kaspersky Lab, we have several sandboxes, we will look at just one of them that was customized to serve the needs of a specific product and became the basis of Kaspersky Anti Targeted Attack Platform.
Based on a sample set of business email compromise data, Trend Micro revealed that cybercriminals fooled the CEO position the most, while CFOs and finance directors were the top targets of attacks.
Cybercriminals on average charge $544 for ransom per device, signaling a new sweet spot for payouts.
Reasonably priced, module-based training courses and helpful forums will train a beginner in all the tools and techniques of the successful cybercriminal, Rick Holland of Digital Shadows explains.
A free tool available on hacking forums allows budding hackers to build their own Android ransomware simply by filling out a few forms.

Neutralization reaction

Corporate information security services often turn out to be unprepared: their employees underestimate the speed, secrecy and efficiency of modern cyberattacks and do not recognize how ineffective the old approaches to security are.

And if there is no clear understanding of what sort of incident it is, an attack cannot be repelled. We hope that our recommendations about identifying incidents and responding to them will help information security specialists create a solid foundation for reliable multi-level business protection.
During the preparation of the “IT threat evolution Q2 2017rdquo; report I found several common Trojans that were stealing money from users using WAP-billing. We hadnrsquo;t seen any Trojans like this in a while, but several of them appeared out of nowhere. Most of them had been under development since the end of 2016 / the beginning of 2017, but their prevalence increased only in the second half of Q2 2017.

Therefore, I decided to take a closer look at these Trojans.
How enterprises can get an edge over innovative cybercriminals by creating a cycle of continual security posture adjustment within their own organizations.

IT threat evolution Q2 2017

The threat from ransomware continues to grow.

Between April 2016 and March 2017, we blocked ransomware on the computers of 2,581,026 Kaspersky Lab customers.
In May, we saw the biggest ransomware epidemic in history, called WannaCry.
According to KSN data, Kaspersky Lab solutions detected and repelled 342, 566, 061 malicious attacks from online resources located in 191 countries all over the world.
Leaks and dumps are handing more tools for creating ransomware and other malicious software to cybercriminals.

DDoS attacks in Q2 2017

The second quarter quite clearly showed that the DDoS-attack threat is perceived rather seriously.
Some companies were prepared to pay cybercriminals literally after their first demand without waiting for the attack itself.

This set off a whole new wave of fraud involving money extortion under threat of a DDoS attack, also known as “ransom DDoSrdquo;.