
SECURITY AWARENESS TRAINING BY HORNETSECURITY
SECURITY AWARENESS TRAINING BY HORNETSECURITY
On this page we provide you SCORM files of our Security Awareness Training Quizzes and Courses to download.
There are different types of malware attachments, both the file type and the attack type. Let’s start with the attack type where some simply have the malware embedded in the file. This could be a virus, or even a ransomware payload that’ll try to encrypt all documents on your local device, and perhaps on file shares you have access to as well and then demand payment for the decryption key.
This type of ransomware is rare today, firstly because they’re easy to spot for email hygiene solutions such as Hornetsecurity’s Advanced Threat Protection which will open every incoming email attachment file in a sandbox and inspect its actions and if they’re malicious the email will never even reach the user’s inbox.
And secondly, even if the email hygiene solution misses the malware, when it tries to execute on the device, the Endpoint Detection and Response (EDR) is likely to block it. It’s also partially because this type of ransomware (and malware in general) is very imprecise as the attackers don’t know which of the thousands of emails they send out is going to lead to a successful breach.
Ancidentally, these types of malware attacks were popular over a decade ago, before the criminals had perfected the model of ransoming your entire business network.
Today, the attached malware is much more likely to be aimed at stealing identities. A popular approach is a PDF that needs to be digitally signed for example and then links to an Attacker in the Middle (AitM) webpage where the user must sign in to their account (where the criminals steal your credentials in the background, unbeknownst to the user).
Another type of malware is infostealers, a small application that’ll run silently in the background on your device, copying all passwords and other secrets that you enter on any site to the criminal’s servers.