Skip to main content
Articles

Learn more about digital threats

By July 20, 2018#!28Thu, 28 Feb 2019 10:40:08 -0300p0828#28Thu, 28 Feb 2019 10:40:08 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28 28am28am-28Thu, 28 Feb 2019 10:40:08 -0300p10America/Sao_Paulo2828America/Sao_Paulox282019Thu, 28 Feb 2019 10:40:08 -03004010402amThursday=904#!28Thu, 28 Feb 2019 10:40:08 -0300pAmerica/Sao_Paulo2#February 28th, 2019#!28Thu, 28 Feb 2019 10:40:08 -0300p0828#/28Thu, 28 Feb 2019 10:40:08 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28#!28Thu, 28 Feb 2019 10:40:08 -0300pAmerica/Sao_Paulo2#No Comments

At digital threats are increasingly present in our personal and corporate lives, so it is important to understand them.

Hackers most often aims to take advantage of people's needs, they exploit those needs with many different types of threats like Malware, Rootkit, Trojan Horse, Ransomware and Phishing.

To try to protect ourselves we will understand in this article what each of these threats are:

Malware

According to Avast Malware It is considered a type of annoying or malicious software that intends to secretly access a device without the user's knowledge. Malware types include spyware, adware, phishing, rootkit and ransomware.

Malware usually arrives on your device via the internet and email, and may do so through hacked websites, games, music files or any file downloaded from the internet to a device that is not protected with anti-malware software.

Rootkit

According to Kaspersky Rootkit Malware that has the ability to hide on a victim's system for months, sometimes even years, letting the hacker stealthily use the computer for whatever he wants.

Even a machine that has no valuable information, which is unusual as any personal or corporate information has relative value, can be useful for producing bitcoins, sending spam, and participating in DDOS attacks. This functionality allows hackers to hide their criminal activity not only from built-in operating system monitoring tools, but also from built-in antivirus sensors.

If the antivirus can detect a rootkit, malware may try to disable protection and delete some delicate components of the solution.

The rootkits most advanced use scapegoat techniques, create irrelevant files especially for detection by the antivirus when the software accesses the file. rootkitknocks it down trying to prevent future detections.

Trojan Horse

According to AVG the Trojan horse malware gets its name from the classic story of the Trojan City invaded through enemies hidden in a structure of a Wooden Horse presented to it as it mimics the technique of infecting computers through a computer. supposedly harmless package that paves the way for malicious code.

The Trojan horse lurks in programs that seem harmless, or tries to trick you into installing it without realizing its real purpose.

The Trojan horse does not replicate by infecting other files or computers, instead they survive by being hidden, they may be silent on your computer, collecting information or setting up breaches, or they may simply control your computer and block your access to it. . Its most common actions are:

1. Create “Back Doors” - Trojan horse typically changes its security system so that malware or hackers can break into it.

2. Spying - Some Trojan Horses Are Essentially spyware designed to wait until you access your online accounts or enter your credit card details and after collecting the data it sends them back to their master / creator.

3. Turn your computer into a zombie - Sometimes a hacker is not interested in you, but wants to use your computer as a slave in a zombie network to perpetrate other attacks.

Ransomware

Ransomware It is a type of harmful software that restricts access to the infected system and charges ransom so that access can be restored, if the ransom payment does not occur the files may be lost or even published. According to the Cisco report, it dominates the digital threat market and is the most cost-effective type of malware in history. The first documentary report of this type of attack occurred in 2005 in the United States.

An example of this type of malware is Arhiveus-A, which compresses files on the infected computer into an encrypted package. It then states that the files can only be recovered with a hard-to-crack key, usually 30 digits, which the victim will receive upon payment of the ransom made on the attacker's website. It is a scam or an extortionate action this type of hacker (crackers), even after payment of the ransom may or may not provide the key to decrypt the files.

Usually one ransomware does not propagate itself, however one of ransomwares most famous this year is the wannacry, which infected millions of computers worldwide, combined the technique ransomware file encryption with self-propagating malware.

Phishing

Phishing It is a technique used by hackers to trick the user into collecting personal information such as passwords, credit card details, social security number and bank account number. They do this by using fake emails or directing you to fake websites to trick you into putting your personal information on the website.

The attack of Phishing It is one of the most effective within the goal of information theft as it directly depends on the user's care in identifying it.

Because of this security training for users is one of the most effective ways to protect against attacks from phishing.

Another quick and easy way to respond to this type of cybercriminal activity is by reporting, most companies block phishing and insert into blacklist within 15 minutes of being reported. For this you can copy the address of the possible phishing and send to the addresses below:

1. urlscan.io - Redirect Analysis and Screenshots of phishing

2. UrlQuery.net - Database Search phishing Reporting and URL Analytics

3. CheckPhish.ai - Engine for detection of phishings

4. phishcheck.me - Engine customized for analysis and detection

5. VirusTotal - Multiple Check blacklists

In 2016 the SANS Institute revealed that 95% of all cyber attacks had an early attack of phishing. According to CERT.br from January to December 2016 15,87% of reported incidents were fraud attacks.

Conclusion

There are several ways to prevent a threat. Here we list some:

  • Always have good habits and do not respond to suspicious links;
  • Avoid placing your information and personal data on websites you have never visited before, or are unsure of where they came from:
  • Do not open email attachments you did not request;
  • Keep your browser up to date;
  • Keep security updates in place and always have a good antivirus installed on both computers and mobile devices, as remember that these threats occur in Windows, Linux, iOS, Android and others.

[SAFEWAY Team]

 

About [SAFEWAY]

THE [SAFEWAY] is a widely recognized company as a provider of premium information security and cybersecurity solutions. From its extensive portfolio, we highlight several solutions, including those based on platforms:

● Archer da RSA Security, considered by the institutes Gartner and Forrester and by the market itself, the most complete process integration solution for Governance, Risk Management, Compliance and Business Continuity Management;

● [SAFEWAY] Security Tower, supported by IBM Qradar (Watson technology), tailored to each organization in its security and cyber defense management needs.

● And others, involving technologies ImpervaThales and WatchGuard Technologies.

More information: [email protected]

Leave a Reply