Article (PSA-0029)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: The Current Computer Security Landscape
The Internet is a very dangerous place. Computer security threats are a very real concern for any business or home that uses a computer. Symantec, a computer security provider, reported that ransomware attacks spiked in October 2023 and the number of organizations affected by ransomware was 66% more than a year earlier. Ransomware continues to be one of the most lucrative forms of cyber crime and, as such, remains a critical threat for organizations of all sizes as well as home based computer users.
So why is there so much malware, and what is the point? It comes down to money. As our society becomes more reliant on computers and mobile devices, we become more vulnerable to thieves extorting us out of our money. Locking you out of your devices and demanding money to unlock it or stealing and selling your personal information, such as banking and credit card information, is a huge money making industry. These attackers not only steal information, but once they have compromised a computer system, they can use it to attack others, and perform other illegal activities – masquerading as you!
Methods for infecting computers with ransomware and other malware are often quite sophisticated. Symantec says, “The main infection vector for ransomware is no longer botnets – instead, it is the exploitation of known vulnerabilities in public facing applications. Except for the ransomware payload iteself, attackers are increasingly eschewing malware while carrying out attacks. Many of the tools attackers use are legitimate software, either dual-use tools or operating system features. Windows operating system components are the most widely used legitimate software (so-called living off the land) used by attackers”.
Other types of legitimate tools used by attackers include remote desktop, remote administration and remote support tools. The web is also an absolute quagmire of malicious intent. Malicious payloads can spread through, what appear to be, legitimate emails, legitimate files, links, and websites. To make matters even worse, would be attackers can easily obtain “attack toolkits,” for free or purchased from the internet – making cybercrime easy and inexpensive to commit. Criminials now have access to advanced tools, such as templates for extortion attacks enabling them to exploit zero-day vulnerabilities in enterprise software. This allows the attacker to steal data from multiple organizations at once, netting itself a huge pool of victims from a single attack campaign.
It’s important for all computer users to have a basic understanding of these threats and to learn how to protect themselves. This series of short articles will provide an overview of malware threats, suggestions for infection prevention using available tools and a healthy dose of common sense. I will also provide you with some basic steps to take if you suspect your computer is infected. But for now lets take a look at malware.
What Is Malware?
The word “malware” is a portmanteau, blended from the words “malicious” and “software.” It is most often used as a catchall term for computer related threats such as viruses, spyware, adware, and other software installed without a user’s consent or knowledge.
Malware can get into your system in a variety of ways. Here is short, not exhaustive, list:
- Infected email attachments
- Infected removable storage such as portable “thumb-drives”
- Downloaded software
- Links in emails, social media websites, or instant messaging applications
- Vulnerabilities in legitimate Windows applications and features
Here are a few categories of malware, again, not exhaustive:
- Viruses are a kind of self-replicating software that can slow down or cripple systems, and destroy or alter data.
- Spyware is software that spies on computer users’ activity to steal passwords, online banking login credentials, and other personal information, typically by using a “keylogger”. A keylogger records the keys you press and sends it back to the attacker.
- Adware displays annoying pop-up ads, which can also contain malicious links.
- Scareware mimics a legitimate antivirus or anti-spyware service, saying a computer has been infected, then encouraging users to download (and pay for) a fake security solution. The downloaded software is usually malicious.
- Ransomware encrypts files on a computer, making them inaccessible until a specified ransom is paid. Ransomware is usually the payload of other malicious activity.
- Botnets are networks of infected computers used for illegal activities, such as sending spam emails or “denial of service” attacks.
Do You Need to Worry About Malware?
So you may be thinking this all sounds scary, but does it really affect me at home or at my place of business? Yes! It is not just large companies or government organizations that need to protect themselves. Anybody, home user or business, can be a victim of malware if not properly informed and protected.
If you are a business, your customers trust you with their personal information. If you are a home user you probably have precious family pictures or important documents stored on your computer. If you’re not taking steps to secure your data, your information is not safe. Information security breaches can have major financial and legal consequences.