What do you mean it's been stolen!

What do you mean it's been stolen!

I have always marvelled at the variety of illegal things people are capable of coming up with when it comes to stealing information and messing with people’s personal data.

I remember back in the day using eMule and having good old Norton antivirus pick up a ton of trojans. It didn’t always pick up everything though, so occasionally mum would call the IT guy over to do a system reinstall.

No alt text provided for this image

Getting infected by malware when downloading files is still as current as when I was in my teens. A lot has changed since then, and cybercriminals have certainly become ever so creative and versatile. Take for instance Emotet. It was the talk of the week at the end of January 2021 because it had finally been taken down, and not by an antivirus but a multinational task force focused exclusively on disrupting this threat.

Emotet is, or was, a trojan – and also a bot – with worm-like capabilities which were mainly spread through phishing emails. This much terminology in one sentence can be a bit confusing, so let’s break it down.

A trojan is a type of malware which contains malicious code embedded into something that looks mostly harmless, like a Word document. Users get tricked into executing or installing it thus infecting the users’ system. Trojans don’t self-replicate and require a person to actually interact with them to do their thing – like opening an attachment, for example.

A bot is an automated process or script which interacts with other network services. A bot can, for instance, self-propagate and connect to the server(s) being used on the attack. These servers are known as Command and Control (C&C) servers and are used to remotely access the target network of compromised devices, known as a botnet.

Worms can travel between systems without any action from the user. They can self-replicate and tunnel through various devices unnoticed. Worms are primarily designed to spread and infect – not only computers, but all networks and servers.

No alt text provided for this image

Phishing emails, well… If you have a Gmail, Yahoo or Hotmail account, go to the spam folder and FOR THE LOVE OF GOD, DO NOT CLICK ANYTHING! But do have a look at the subjects and the senders. Most of them are obviously fake, but occasionally you will find one with a familiar branding, containing a link or attachment, which will look genuinely legitimate. The purpose is to lure the user to click the link or open the attachment which, in turn, executes the virus.

With all this information widely available on Emotet, why was it so difficult to stop it? Because it was made to look like a legitimate Windows system process! And just to put a cherry on top, as a blended threat with multiple capabilities, it could regularly update itself through C&C – meaning it could look different as and when modified by the cyber criminals.

And why was it so dangerous? Because it opened the backdoor to other more worrisome malware, such as ransomware. Ransomware disables the user’s system and blocks them from accessing their data by encrypting those assets or locking the user out of their machine. It then demands a ransom payment to unlock the user’s computer and restore access to the data.

No alt text provided for this image

Cyber security awareness is crucial to avoiding attacks in the first place, but when that isn’t enough, it’s important to have access to proper tools to help keep those threats away.

Acronis Cyber Protection solutions deliver outstanding threat protection with technologies employing machine learning to proactively mitigate attacks and highlight vulnerabilities. Learning and understanding what viruses can do to your system, and how to spot compromised links is a full-time job, so let Acronis do the heavy lifting for you. Get in touch with our team to find out how.

要查看或添加评论,请登录

Desirre Kaluza ?的更多文章

  • Azure Plan at a glance

    Azure Plan at a glance

    Heard talk about Azure Plan on the grapevine? Yesterday Giacom hosted a webinar where we covered everything MSPs need…

    3 条评论
  • SharePoint migrations are coming of age!

    SharePoint migrations are coming of age!

    Mid-January BitTitan launched MigrationWiz Shared Documents licence, which migrates SPOL to SPOL. Those guys must have…

    5 条评论
  • Sounds like a Monty Python sketch

    Sounds like a Monty Python sketch

    Imagine you are in Ancient Greek times. You’re a soldier and you’re in an army camp during war.

  • Into the Blue Sea of Cyber Security

    Into the Blue Sea of Cyber Security

    On my second week as Product Manager, I had a training session with one of the cyber security specialists at Westcoast…

  • Tick your Readiness box

    Tick your Readiness box

    Sitting in front of the screen all day, we often get burdened with never-ending webinars, conference calls and visual…

    4 条评论
  • Nerdio webinar roundup

    Nerdio webinar roundup

    Yesterday we brought to you a unique opportunity to hear first-hand why we are so excited about our new partnership…

    1 条评论

社区洞察

其他会员也浏览了