• About
  • Archive
  • Contact
  • basefarm.com
Basefarm Blog
  • Big Data blog
  • Cloud blog
  • Security blog
  • DevOps blog
  • Menu

Malware is so 2017: five new security trends to watch out for

Remember when several massive ransomware attacks went global and hit many big businesses? Outbreaks such as Petya and WannaCry really put the malware threat on the IT agenda and made cybersecurity a priority for everyone. But it doesn’t stop with malware, there are many more security threats out there. The attackers’ arsenal is expanding and becoming more complex. Fredrik Svantes, Senior Information Security Manager at Basefarm, discussed with us the latest developments that keep the cybersecurity community busy.

  1. Use of standard tools by attackers
    Many companies have become much more aware of the need to be more secure. Greater cybersecurity efforts have made it harder for attackers to remain undetected while they are within their target’s network. In its recent annual report, the Dutch national intelligence agency AIVD reports an increase in the use of standard tools for attacks, some from nations dabbling in digital espionage. Fredrik Svantes, sees this happening more and more: “Attackers don’t want to get caught while stealing valuable data. High-profile targets deploy many security systems, malware detection systems for example. If attackers use specific “hacker tools” in their reconnaissance phase, this will raise a red flag. So they opt for standard Windows tools, like Microsoft Power Shell, to look around in the network.”
  2. Big data becomes a security system
    How to keep out attackers who apply standard tools? Basically, this comes down to setting up a baseline for how employees use their systems. This is where big data analytics comes into the picture as it can help detect anomalies. “For instance, technicians will have certain work routines, while people in the finance department have a different workflow. When all of a sudden someone in the finance department opens Power Shell, this is not a standard behaviour. This will trigger warning signals even though it just happens to be a standard Windows application.” Especiallyusers with high security risks, like government and companies with significant volumes of IP or critical data to protect, rely on big data for security. Svantes: “Facebook does so for sure.”
  3. Security professionals are hard to find
    Organizations looking to hire security professionals find themselves competing in a fierce market. “If you need security personnel in about a year, you’d better start recruiting them now,” says Svantes. “You can’t start recruiting just three months before an important project.” Although the situation might be improving, with several top European universities introducing security education programmes, right now the lack of experts is a huge problem. For most companies, the best immediate bet is to look for external partners who can help to secure their IT. “Not every company needs a team of security professionals, but what everyone does need is people who are security aware. For example, developers should have security in the back of their minds while working on their projects.”
  4. Your servers turn into secret bitcoin miners
    Regardless of the market you operate in, a trend that is emerging is criminals utilizing compromised servers for cryptomining which requires high amounts of computing power. “To have a single server mining for cryptocurrency is not very efficient, but it adds up when you have thousands of compromised servers working for you. Because cryptomining networks use substantial resources, the increase of resource usage can often sets off alarm bells if proper detection measures are in place.” How can attackers be kept out? Most importantly, make sure your systems are up to date. Don’t leave things unpatched or run old versions of software. And of course: don’t click on everything you see. Attackers still see e-mail scams as an attractive “way in”.
  5. A shift from prevention to detection
    “It’s one thing to try to protect your company, but there is no way to be 100% protected,” Svantes states. “The past couple of years have witnessed a strong focus on preventing attacks from happening. But now, many companies are waking up to the fact that they can only prevent so much. What they can do however, is try to detect intrusions as soon as they happen.” In a world of changing threats and compute-everywhere environments, the old security paradigm of just building bigger walls will be replaced by a continuum from block to allow. Machine Learning is becoming the key technology for predicting, detecting and preventing known and unknown threats. According to Gartner, deploying threat detection and response tools is a top priority for Chief Information Security Officers (CISOs). These investments can make a big difference. A recent report published by the US Ponemon Institute calculates that when an intrusion is found in less than 100 days, the average cost is $2.8 million. When detection takes longer than 100 days, the expense jumps to $3.8 million.
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Google+
  • Share on Pinterest
  • Share on Linkedin
  • Share by Mail

Related posts

Cybersecurity Updates For Week 17 of 2022

April 29, 2022/by Sjir Bagmeijer

Cybersecurity Updates For Week 15 of 2022

April 15, 2022/by Sjir Bagmeijer

Cybersecurity Updates For Week 12 of 2022

March 25, 2022/by Sjir Bagmeijer

0-days in Microsoft exchange servers

March 3, 2021/by Basefarm

Microsoft Windows Multiple Security Updates Affecting TCP/IP | CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086

February 10, 2021/by Basefarm

CVE-2020-17095 | Windows Hyper-V Remote Code Execution Vulnerability

December 11, 2020/by Basefarm

CVE-2020-16891 | Windows Hyper-V Remote Code Execution Vulnerability

October 14, 2020/by Basefarm

CVE-2020-3992 | ESXi OpenSLP remote code execution vulnerability

October 11, 2020/by Basefarm

CVE-2020-0618 | Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability

February 20, 2020/by Basefarm

Security Software & Tools Tips – December 2019

December 22, 2019/by Sjir Bagmeijer
Load more

Recent Posts

  • Cybersecurity Updates For Week 17 of 2022
  • Cybersecurity Updates For Week 16 of 2022
  • Cybersecurity Updates For Week 15 of 2022
  • Cybersecurity Updates For Week 14 of 2022
  • Cybersecurity Updates For Week 13 of 2022
Subscribe via RSS

Recent Comments

  • kuncham on Oracle fixes vulnerabilities
  • Oracle Appications on Oracle Patch Update April 2013
  • Anudeep on How to install Logstash on Windows Server 2012 with Kibana in IIS.
  • Kumar on How to install Logstash on Windows Server 2012 with Kibana in IIS.
  • Øyvind Dyrnes on December 2 – Regularly download security updates and “patches”

Archive

  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
© Copyright - Basefarm Security Blog
  • Facebook
  • Twitter
  • Instagram
  • Mail
BF-SIRT Newsletter 2018-11 BF-SIRT Newsletter 2018-12
Scroll to top