11 Biggest cyber security threats in 2021
#1
Exclamation 
Quote:
[Image: CyberSecurityThreatsLock.jpg]

Cyber security threats persist and continue to emerge during the last years. By now you probably heard about phishing, but did you know about polyglot files yet? This article covers a unique insight to the 11 biggest cyber security threats in 2021.

1. Phishing meets COVID-19

In a phishing attack, a digital message is sent to fool people into clicking a link inside of it. There are several possibilities for malicious actors to use such campaigns. Depending on the intention of the actor, harmful malware is installed or sensitive data is exposed.

During the current Corona crisis, the people are are at home more often. Adding to that, employees are working from home more than ever before. This presents itself as great breeding ground for cyber criminals.

Phishing attacks are setup in a way to send the victims to websites with fake information about the Coronavirus. Often times, these sites use the user's system resources to earn cryptocurrency like Bitcoin - All without the approval of the user - Read more.
 
Be sure to give our security awareness trainings a completely free try, If you feel the healthy need to protect your work better!
 
2. Clever ransomware?

Due to the profitability, ransomware was present in 2020 and won't fade away anytime soon. Ransomware encrypts files on computers and ask the user for a ransom in return of the original files. The rise of a cryptocurrency like Bitcoin surely helped ransomware attacks, as it allows the malicious actor to be more anonymous.

In the case of the Cyrat ransomware, the ransomware was disguised as software to repair corrupted DLL files on the computer. In reality, parts of the system are encrypted during execution.

In 2021 and onwards, it's possible to see more sophisticated attacks going on. Ransomware could ask for a dynamic ransom, depending on the environment in which it's executed. For example, a ransomware running on a Mac could ask for a higher ransom than on a Windows machine. That's because Mac setups usually cost more money than Windows setups. From this, an assumption about the relative net worth of a person behind such a setup can be made.

3. Polyglot files - Just a .JPG, isn't it?

Polyglot files are a valid form of multiple different file types. A file can be both: Opened as image with an image viewer or run like JavaScript within the browser.

This method is used in advertising fraud already. It could get worse once there are no more skills required to build such malware. Specialized services could offer the creation of such files in return for a payment - source.

Polyglot malware isn't limited to the web. In a case, a malicious JAR file was appended to the end of a windows installer file (.MSI).  Security solutions that rely on the Microsoft Windows code signing validation can be bypassed with this - source.

4. IoT attacks and the growing impact

The Internet of Things (IoT) grows in connected devices by every year - source. Forecasts suggest, that in 2025 the number of connected IoT devices will be more than 75 billion - Tripled from the year 2019.

We get it, connected devices makes living more comfortable. It's nice to wake up on an already made coffee, because your alarm clock is connected with the coffee machine. However, to this convenience there comes a catch. If the IoT devices aren't properly secured, they could be open to bad actors.

In 2020, we observed an IoT botnet. The botnet was placed on vulnerable access control systems, which are commonly found in office buildings. You might have entered such a building with the swipe of your keycard before, without the knowledge that the system is infected.

5. Social engineering and cryptocurrency

In an attack that uses social engineering, not only the technology is at focus. Social engineering targets the human aspect. Phishing is a prominent example of it. Social engineering can occur in any form sensitive information can be gathered - In an email, face to face or even via a phone call.

Sim swapping is an attack where the bad actor gains access to the SIM card from the victim. Due to clever social engineering, the mobile carrier is tricked into thinking that the bad actor is the real customer. If successful, the bad actor gets the control of the SIM card and receives the text messages and phone calls. This attack is also used to gain access to social media accounts or cryptocurrency wallets.

Social engineering can also be purely reliant on the social aspect. The service employee to "fix your bad WiFi" might not be who you think it is. Companies usually make appointments with you upfront. It generally makes sense to decline such spontaneous appointments.
...
Continue Reading
Reply


Messages In This Thread
11 Biggest cyber security threats in 2021 - by harlan4096 - 07 May 21, 07:42

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
UltraSearch 4.9.1
Version 4.9.1 I...harlan4096 — 10:46
Microsoft Edge 146.0.3856.59
Microsoft Edge 146...harlan4096 — 10:45
Google Chrome 146.0.7680.80
Google Chrome 146....harlan4096 — 10:39
Vivaldi 7.8 Build 3925.81
Vivaldi 7.8 Build ...harlan4096 — 10:38
Kaspersky\VPN\KSOS 21.25 (MR25) & KES 1...
harlan4096 — 10:37

[-]
Birthdays
Today's Birthdays
avatar (51)tersfargum
avatar (50)alfreExept
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (43)Hectorvot
avatar (51)knowhanPluts
avatar (39)Williamengiz
avatar (46)qaqapeti
avatar (44)battsourIonix
avatar (43)CedricSek
avatar (39)chasRex
avatar (33)uteluxix
avatar (47)piafcflene
avatar (39)Matthewkah
avatar (38)Charlesfibre
avatar (38)francisnj3
avatar (43)artmaGoork

[-]
Online Staff
There are no staff members currently online.

>