Security Update – 2019
Article (PSA‑0011)
Why This Year Was a Wake‑Up Call
From the rapid spread of WannaCry and NotPetya ransomware to the explosion of illicit cryptocurrency miners, 2017 reminded us that cyber‑threats can appear from unexpected places. Each year the quantity and variety of threats increase, and attackers continuously develop new ways to infiltrate devices while covering their tracks.
Key Threat Statistics (2017‑2023 Trend Highlights)
- Ransomware – Over 2 billion records exposed worldwide (2022 Verizon DBIR).
- Cryptocurrency miners – Symantec reported an 8,500 % increase in miner detections from 2016 to 2017; the trend continues with modern “cryptojacking” scripts on compromised websites.
- Downloader families – + 92 % new variants reported in 2017; these “dropper” programs fetch additional malware after initial infection.
- Mac malware – + 80 % new threats in 2017, and the numbers have kept climbing as macOS market share grows.
What Is Malware?
“Malware” = malicious software. It’s an umbrella term for any program that infects a computer without the user’s consent, including viruses, ransomware, spyware, ad‑ware, trojans, and cryptominers.
Common Infection Vectors (non‑exhaustive)
- Infected email attachments.
- Compromised USB thumb drives or external disks.
- Downloads from untrusted websites or pirated software.
- Malicious links in email, social‑media posts, instant‑message chats.
- Drive‑by downloads via compromised legitimate‑looking websites (malvertising).
For a full glossary of terms, see our Threat Glossary.
Do You Need to Worry About Malware?
Absolutely. Cyber‑crime targets anyone with an Internet‑connected device—home users, small businesses, and large enterprises alike.
- Business impact: A breach can expose customer data, trigger legal penalties (GDPR, HIPAA, PCI‑DSS), and damage reputation.
- Personal impact: Family photos, financial documents, and personal communications can be stolen, encrypted, or deleted.
- Recent surveys (Verizon 2023) show **≈ 1 in 3 people** reported a personal security incident in the past year.
Basic Protection Checklist (Start Here)
- Keep software updated. Enable automatic Windows/macOS updates, and patch third‑party apps as soon as patches appear.
- Use reputable antivirus/anti‑malware. Microsoft Defender (Windows 10/11) or a trusted third‑party solution (Bitdefender, Malwarebytes, ESET).
- Enable a firewall. Built‑in OS firewall is sufficient for most home users; ensure it’s turned on.
- Practice safe browsing. Don’t click unknown links, verify URLs, and avoid downloading from untrusted sites.
- Secure email. Use spam filters, enable MFA on email accounts, and never open unexpected attachments.
- Back up your data. Follow the 3‑2‑1‑0 rule (three copies, two media types, one off‑site, zero errors).
- Enable multi‑factor authentication (MFA) on any cloud service, VPN, and privileged accounts.
What to Do If You Suspect an Infection
- Disconnect the device from the Internet (disable Wi‑Fi/Ethernet).
- Run a full scan with an up‑to‑date anti‑malware product.
- If the scan reports ransomware or a serious threat, isolate the machine and consider professional remediation.
- Change passwords for any accounts accessed from the infected device (preferably from a clean device).
- Restore files from a recent, verified backup if they have been encrypted or corrupted.
2025 Update – New Threat Landscape & Mitigations
Since the original 2017‑2023 overview, several important developments have reshaped the threat environment. Below is a concise addendum you can use to keep the article current.
1️⃣ Ransomware‑as‑a‑Service (RaaS) is Mainstream
- Attack‑as‑a‑service platforms (e.g., LockBit 2.0, Hive, Blackcat) let low‑skill actors launch ransomware attacks for a subscription fee.
- 2024 Verizon DBIR reported 61 % of data‑breach incidents involved ransomware, and total ransomware payments in 2024 topped **$1.5 billion**.
- Mitigation: Deploy **endpoint detection & response (EDR)** solutions (CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint) that can detect malicious behavior before encryption begins; maintain immutable backups (write‑once, read‑many) to thwart ransom demands.
2️⃣ AI‑Generated Phishing & Deepfake Social Engineering
- Large‑language models are being used to craft hyper‑personalized phishing emails that bypass traditional keyword filters.
- Deepfake video/audio calls are increasingly used to impersonate executives (“CEO fraud”).
- Mitigation: Adopt **zero‑trust email verification** (DMARC, SPF, DKIM), train staff with regular simulated phishing campaigns, and enforce MFA for all privileged accounts.
3️⃣ Supply‑Chain & Software‑Update Attacks
- After the 2020 SolarWinds breach, attackers have focused on compromising software update mechanisms (e.g., recent Octave and EventX incidents in 2025).
- Mitigation: Verify code signatures, enable **code‑signing integrity checks**, and limit admin rights on update tools.
4️⃣ Cryptojacking Evolution
- Browser‑based cryptojacking scripts now target **WebAssembly** for higher hash rates, often delivered via compromised ad‑networks.
- Mobile devices are also being hijacked to mine Monero via malicious apps.
- Mitigation: Use browser extensions that block crypto‑mining scripts (e.g., uBlock Origin, NoScript), keep browsers and plug‑ins up to date, and run mobile anti‑malware scans.
5️⃣ Rise of “File‑less” Malware & Living‑off‑the‑Land (LotL) Techniques
- Attackers increasingly leverage legitimate OS utilities (PowerShell, Windows Management Instrumentation, Office macros) to execute payloads without dropping a file on disk.
- Mitigation: Enable **Windows Defender Exploit Guard** (Attack Surface Reduction rules), enforce **Application Control** (AppLocker or Microsoft Defender Application Control), and limit PowerShell execution policies.
6️⃣ Enhanced Defensive Technologies (2025)
- Microsoft 365 Defender XDR integrates email, endpoint, identity, and cloud app protection using AI‑driven analytics.
- Zero‑Trust Network Access (ZTNA) replaces traditional VPNs for many businesses, reducing lateral movement risk.
- Endpoint platforms now provide **automated ransomware rollback** (e.g., CrowdStrike’s “Rollback” and SentinelOne’s “ActiveEDR”) that can restore files to pre‑infection state without a backup.
7️⃣ Updated Statistics (2025)
- IDC estimates **5.6 billion** devices will be infected with some form of malware by the end of 2025.
- 2024 Palo Alto Networks report shows a **28 % increase** in credential‑theft attacks targeting remote‑work setups.
- Cyber‑insurance premiums have risen an average of **23 %** year‑over‑year, reflecting the growing cost of ransomware and data‑breach remediation.
Need Help Right Now?
If you have questions about current threats, want a security assessment, or need assistance cleaning an infected system, call PSA Computer Services at (707) 506‑6802. We’ll help you protect your data and get you back online safely.