0% found this document useful (0 votes)
68 views13 pages

Cyber Threats: Top 10 Facing Businesses Today (2020)

The top 10 cyber threats facing businesses in 2020 are: 1) Ransomware that locks systems until a ransom is paid; 2) Fileless malware that resides in RAM to avoid detection; 3) Crypto-malware that uses systems' processing power to mine cryptocurrency slowing them down; 4) Zero-day threats that exploit unknown vulnerabilities before fixes; 5) Meltdown and Spectre chip vulnerabilities that are difficult to defend against; 6) IoT malware that can control smart devices; 7) Banking malware that steals financial info; 8) Stegware that hides malware in legitimate files; 9) Phishing emails that trick users into installing malware; and 10) Advanced persistent threats that infiltrate systems long
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views13 pages

Cyber Threats: Top 10 Facing Businesses Today (2020)

The top 10 cyber threats facing businesses in 2020 are: 1) Ransomware that locks systems until a ransom is paid; 2) Fileless malware that resides in RAM to avoid detection; 3) Crypto-malware that uses systems' processing power to mine cryptocurrency slowing them down; 4) Zero-day threats that exploit unknown vulnerabilities before fixes; 5) Meltdown and Spectre chip vulnerabilities that are difficult to defend against; 6) IoT malware that can control smart devices; 7) Banking malware that steals financial info; 8) Stegware that hides malware in legitimate files; 9) Phishing emails that trick users into installing malware; and 10) Advanced persistent threats that infiltrate systems long
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Top 10 Cyber Threats

Facing Businesses
Today [2020]
Ransomware
Ransomware quickly rose through the ranks of malicious
applications recently as one of the more noticeable threats.

What’s alarming about this ransomware is its ability to lock


down a computer and unlock it only after the owner pays a
ransom. This system hi-jacking component makes
ransomware very disruptive.

Attackers are spending time intelligence-gathering on their


victims to ensure they can inflict maximum disruption, and
ransoms are scaled up accordingly.
Fileless Malware
Fileless malware gained the “fileless” moniker because it does
not exist as files within the hard drive. Attackers program file-
less malware to occupy the RAM. Threat analysts have a hard
time finding traces of this kind of malware since it does not
leave crumbs on the drive.

Fileless malware turn visible only when programmers order it to


initiate the attack. Cybercriminals often deploy fileless malware
against banks by inserting them into ATMs. The hackers in turn
gain control of the cash machines. Another successful use
hacker has for file-less malware is payload delivery. Fileless
malware can unload ransomware to the system with the
computer owner totally oblivious to what’s happening.
Crypto-Malware
The rise of cryptocurrencies and the explosive growth of
Bitcoin in 2017 has also gained the attention of
cybercriminals. Malware engineers developed malware
which can actually mine cryptocurrency when the browser
of an infected computer goes on the Internet.

Although not directly harmful, crypto-malware proved to


be disruptive as it steals a computer’s processing power to
mine cryptocurrency. The infected computer bogs down
and is noticeably slower in pulling up files and running
programs. In time, the computer will break down because
of the drain caused by the crypto-malware.
Zero-Day Threats
Software isn’t perfect right off the bat.
Every program installs harbors security
holes, called vulnerabilities, which
hackers and cybercriminals can exploit.
When they find a vulnerability and abuse
it before the software developers can
issue a fix for it, it’s considered a zero-
day threat.

Once the hackers get the ball rolling and


use a program’s vulnerability to deliver
ransomware or inject malicious code
that’s a zero-day exploit. Imagine
employees opening a Word document
file and then it launches ransomware
onto the system.
Meltdown And Spectre
Meltdown and Spectre are essentially vulnerabilities inside
processor chips. What merits special mention for both
vulnerabilities is that because there is an inherent flaw
inside processors and it exists within such a low level of
the system it’s hard to defend against hackers determined
to exploit it.

Hackers and malware engineers who take advantage of


Meltdown and Spectre will be able to bypass current
security measures without issue. They will also gain
access to restricted parts of a computer’s memory and
gain access to the user’s sensitive information.
IoT Malware
Sooner or later homes and businesses will host their own
smart environments. They’ll employ sensors to gain
information about the temperature, use apps to control
the lighting, and attach energy-efficient cameras to
monitor security.

The problem is the firmware of these smart devices is also


riddled with vulnerabilities. Hackers can exploit these
vulnerabilities to control these smart devices. Imagine
hackers switching lights off offices, halting power from
flowing through smart plugs, or simply watching you from
your smart surveillance system.
Banking Malware
Banking malware exists to steal financial information from users
and deliver the information to hackers so cybercriminals can steal
money from victims. Some banking malware specifically targets
mobile users since smartphones now allow people to make online
transactions. What’s sneaky about these kinds of malware is that
their authors pass them off as apps you can download for Android
like battery apps or games. This type of malware will work in the
background and steal your data while you’re not aware.

Emotet, an incarnation of banking malware, is currently one of the


more dangerous strains of malware out there. Basically, Emotet
can change its form to avoid detection and then replicates itself
within the system. It will move from one machine to the next by
brute-forcing passwords to enter its next destination. This
malware targets a user’s financial information, banking details,
and even their Bitcoin purses.
Stegware
Stegware expands malware’s attack surface. Hackers
employ steganography which involves the act of hiding a
malicious file inside another file, image, video, or message.

At one point only the most veteran and well-versed of


cybercriminals could actually craft their own stegware.
However, cybercriminals have become savvier in producing
them and make stegware available through kits in the Dark
Web for even the amateurs to use.

Companies will see more infections in the coming years


resulting from these malicious files hiding under the cover
of legitimate ones.
Phishing Email
Phishing accounts for 90% of all breaches that
organizations face, they’ve grown 65% over the last
year, and they account for over $12 billion in business
losses.

Some degree of data breaches happens because of


human error and the form of human error which leads
to a breach happens when an employee clicks on a
phishing email. A phishing email often carries a
payload like ransomware or a trojan horse virus which
wreaks havoc on the system right after its opened.
Advanced Persistent Threats
Finally, organizations should be wary of advanced persistent
threats. They’re what you would call a “long con” when
applied to a cyber-attack.

Cybercriminals who are into APTs invest a lot of time casing


their target after they’ve successfully infiltrated the system.
Once they’ve gathered information, they’ll start capturing and
transmitting data back to their own servers.

This particular kind of attack is persistent in the sense that it


can go on for years with the victim remaining unaware.
Hackers who participate in APTs are dedicated professionals
and often work in groups to penetrate their target organization.

You might also like