Macros and exploits still cause trouble
The attacks with harmful scripts that cybercriminals particularly like to hide in Office files, will probably continue to accompany us in 2018.
They tend to communicate consistently with compromised websites from different devices. For example, the attackers use PowerShell to perform command-and-control activities to achieve the desired effect that way.
In particular, our security lab gives warning of attacks that use exploits. Unlike macros, these require less or even no user interaction to infect the system. This method often exploits vulnerabilities in popular software shortly after they are released. If the victims’ systems have not been updated yet, then the hackers will have an easy job.
The “Internet of Things” is much loved – also among cybercriminals
The “Internet of Things” has by now been on everyone’s lips. The interconnection of objects is not only popular among technophiliacs. Increasingly, cybercriminals also take their pleasure in it. This is simply due to the fact that many of the wireless connected devices are not quite up to date in terms of safety.
The “Mirai botnet
” has already shown us impressively, how vulnerable unsafe configured IoT devices can be. It seized millions of Internet-related everyday devices such as routers, observation cameras and even toasters. This was followed by a large-scale of DDoS attacks, which even occasionally led to disruptions at Amazon, Netflix or Twitter, therefore even striking very popular Internet services.
Even branches such as the medical sector are taking more and more use of the Internet of Things. Because it is convenient to connect medical devices to the Internet, for example to digitize medical records. However, the resulting dangers should not be underestimated.
Conclusion: Taking the right precautions saves a lot of trouble
As threatening as the new developments may seem: Companies that already use a sophisticated and proven IT security concept have only little to fear.
By contrast, the mere use of antivirus software does not ensure a safe IT infrastructure. On the contrary, the use of traditional anti-virus programs can even have a negative impact on a company’s IT security, as we have previously reported
In fact, considerably more things matter: Efficient IT security concepts are based in particular on prevention and the use of effective IT security solutions. Cloud-based IT security solutions, such as the services provided by Hornetsecurity
, play an increasing role in this. They safeguard you against even the most sophisticated cyberattacks, so that not even ransomware and others can throw your business off track.