Security breach: when cybergangs “make noise”

When discussing the industry sector threat landscape, we often detail events resulting from vulnerabilities discovered by hackers seeking vulnerabilities within an organization’s networks, connected infrastructure, or data storage centers.

However, taking a look at the latest from Nuspire Threat Landscape Report reiterates the need for manufacturers to maintain their defenses even when working with documents, files or websites that appear to have limited hacker interest and no point of connection with third parties.

Nuspire reported a 28% increase in malware attacks, or approximately 52,000 detections per day during the second quarter of 2022. While many are detected and blocked before being seen by the user, some survive by disguising itself as add-ons or support. tools for Microsoft Office documents.

Once the user clicks for additional information in these software programs, which contain built-in online connections to provide legitimate support and downloadable tools, the malware is downloaded, providing a gateway to all network connections, cloud, system and software of this user. .

During that same period, the company reported a 100% increase in botnet activity, reaching a rate of nearly 20,000 attacks per day. This form of malware attaches itself to web pages and emails. Once downloaded unintentionally via the targeted user clicking on a link or agreeing to download a fake asset, the bug can log keystrokes by stealing login credentials and other personal information that often fuels attacks of ransomware.

Mike Pedrick, vice president of cybersecurity consulting for Nuspire, a leading provider of managed security services, joins us to discuss these persistent threats.

Comments are closed.