The most common malware attacks of 2018
December 27, 2018 – It seems like not a day goes by without reading about another high-profile malware attack. In 2018, malware attacks made headlines for a wide variety of reasons, from stealing customer data to holding critical infrastructure hostage. Here’s a rundown of some of the most interesting and damaging malware attacks from the past year.
Salon.com Attack
In October, popular news website Salon.com was caught serving up cryptocurrency mining malware to its visitors. The attack was made possible by a browser plugin that was tricked into thinking it was a legitimate update. Once installed, the plugin would use the victim’s computer to mine for the cryptocurrency Monero.
While the plugin only affected a small number of users, it highlights a creative new way that attackers are using malware. Rather than simply stealing data or holding a system hostage, attackers are now using malware to generate income. And since cryptocurrency mining doesn’t typically damage the system or hinder its performance, the victim may be none the wiser.
If you’re worried about your computer being used to mine cryptocurrency without your knowledge, there are a few things you can do. First, make sure you have an antivirus program installed and running. Second, be cautious of any browser updates or plugins that you install. Only install software from trusted sources, and be sure to read reviews before installing anything new.
Maze Ransomware
In May, a new ransomware strain known as Maze began making waves in the cyber security world. Unlike other ransomware strains that simply lock up a victim’s files and demand a ransom for the decryption key, Maze also threatens to release the victim’s data if the ransom isn’t paid.
This “double extortion” tactic puts even more pressure on the victim to pay up. And it seems to be working, as the Maze operators have reportedly made over $150,000 in ransom payments so far.
If you find yourself the victim of a Maze ransomware attack, your best bet is to restoring your files from a backup. However, if you don’t have a recent backup, you may be forced to pay the ransom. Maze operators have been known to decrypt files for victims who pay, but there’s no guarantee that they will.
In general, it’s best to avoid paying ransomware demands. Not only is there no guarantee that you’ll get your files back, but paying also encourages attackers to continue using this tactic.
Spectre and Meltdown
In January, two major security vulnerabilities known as Spectre and Meltdown were publicly disclosed. These vulnerabilities affect nearly every modern computer, and could be exploited to steal sensitive data from victims.
Fortunately, there have been no reports of these vulnerabilities being exploited in the wild. However, the fact that they exist at all is cause for concern. And it’s likely only a matter of time before someone figures out how to exploit them.
If you’re worried about Spectre and Meltdown, there are a few things you can do to protect yourself. First, make sure your computer’s operating system and all applications are up to date. Many of the major software vendors have released updates that address these vulnerabilities.
Secondly, be sure to install an antivirus program and keep it up to date. While there’s no guarantee that an antivirus program will protect you from these vulnerabilities, it’s better to have one than not.
And finally, keep an eye out for scams. Attackers may try to take advantage of the disclosure of these vulnerabilities to trick people into installing malicious software. Be sure to only install software from trusted sources, and be cautious of any emails or websites that claim to have a “fix” for Spectre or Meltdown.
ccleaner Attack
In September, popular system optimization tool CCleaner was compromised by attackers. The attackers used CCleaner to distribute a backdoor that gave them remote access to victim’s computers.
Fortunately, the CCleaner attack was discovered and shut down relatively quickly. However, it highlights the fact that even trusted and popular software can be compromised by attackers.
If you’re worried about being the victim of a similar attack, there are a few things you can do to protect yourself. First, only install software from trusted sources. If you’re not sure whether a piece of software is legitimate, do some research before installing it.
Secondly, be sure to keep your software up to date. Attackers often exploit vulnerabilities that have already been fixed in the latest version of a piece of software. By keeping your software up to date, you can help to protect yourself from these types of attacks.
And finally, consider using a tool like Malwarebytes Anti-Malware. This tool can help to detect and remove malicious software that your antivirus program might miss.
BadRabbit Ransomware
In October, a new ransomware strain known as BadRabbit began making its way around the internet. This ransomware is particularly insidious, as it uses a fake Adobe Flash update to trick victims into installing it.
Once installed, BadRabbit will encrypt the victim’s files and demand a ransom for the decryption key. Victims have a short window of time to pay the ransom, as the price doubles after 48 hours.
If you find yourself the victim of a BadRabbit attack, your best bet is to restore your files from a backup. However, if you don’t have a recent backup, you may be forced to pay the ransom. BadRabbit operators have been known to decrypt files for victims who pay, but there’s no guarantee that they will.
In general, it’s best to avoid paying ransomware demands. Not only is there no guarantee that you’ll get your files back, but paying also encourages attackers to continue using this tactic.
Petya/NotPetya
In June, a ransomware strain known as Petya began making its way around the world. This ransomware is particularly damaging, as it not only encrypts the victim’s files but also overwrites the Master Boot Record, making it impossible to boot the computer.
Petya was first spotted in Ukraine, where it caused massive disruption. The ransomware quickly spread to other countries, including the United States, Spain, and India.
Fortunately, there is a way to recover from a Petya attack without paying the ransom. However, it’s a complicated process that requires a certain amount of technical expertise. For most people, the best bet is to restore their files from a backup.
If you don’t have a recent backup, you may be forced to pay the ransom. Petya operators have been known to decrypt files for victims who pay, but there’s no guarantee that they will. In general, it’s best to avoid paying ransomware demands. Not only is there no guarantee that you’ll get your files back, but paying also encourages attackers to continue using this tactic.
WannaCry
In May, a ransomware strain known as WannaCry began making its way around the world. This ransomware is particularly damaging, as it not only encrypts the victim’s files but also locks up critical systems, such as hospitals and banks.
WannaCry was first spotted in the UK, where it caused massive disruption. The ransomware quickly spread to other countries, including the United States, Spain, and India.
Fortunately, there is a way to recover from a WannaCry attack without paying the ransom. However, it’s a complicated process that requires a certain amount of technical expertise. For most people, the best bet is to restore their files from a backup.
If you don’t have a recent backup, you may be forced to pay the ransom. WannaCry operators have been known to decrypt files for victims who pay, but there’s no guarantee that they will. In general, it’s best to avoid paying ransomware demands. Not only is there no guarantee that you’ll get your files back, but paying also encourages attackers to continue using this tactic.
So there you have it, a roundup of some of the most interesting and damaging malware attacks from the past year. As you can see, attackers are becoming more creative in the way they use malware, and the stakes are higher than ever.
To protect yourself from these types of attacks, be sure to keep your software up to date and install an antivirus program. And be cautious of any emails or websites that claim to have a “fix” for Spectre or Meltdown. If you’re not sure whether something is legitimate, err on the side of caution and don’t click..Full Article
The different strategies used to defend against malware
As the use of computers and other digital devices has grown, so has the frequency and sophistication of attacks by malicious software, or malware. Malware is any software designed to damage or disable computers or other devices, or to steal sensitive information.
There are many different types of malware, including viruses, worms, spyware, and ransomware. Some malware is designed to damage the victim’s computer or device, while other malware is designed to steal information or money from the victim.
There are also different ways that malware can infect a victim’s computer or device. Some malware is spread through email attachments or links, while other malware is spread through malicious websites or ads.
Despite the different ways that malware can infect a victim’s computer or device, there are a few common ways to defend against malware.
One common way to defend against malware is to use an antivirus program. Antivirus programs scan files and email attachments for known signatures of malware. If a file or attachment is found to be infected with malware, the antivirus program will quarantine or delete the file to prevent it from infecting the computer or device.
Another common way to defend against malware is to use a firewall. Firewalls block incoming connections from computers or devices that are not authorized to access the network. This can prevent malware from spreading to the computer or device through email or other means.
Another way to defend against malware is to keep the operating system and software up to date. Software developers frequently release updates that patch security vulnerabilities. By keeping the operating system and software up to date, you can reduce the risk of malware infection.
Finally, you can use common sense when using the Internet. Be careful about what email attachments or links you open, and be cautious about what websites you visit. If you are unsure about a website, email, or attachment, you can always use a search engine to research it before you open it.
Malware is a serious threat to the security of computers and digital devices. However, there are a few simple steps you can take to defend against malware. By using an antivirus program, a firewall, and keeping your software up to date, you can help protect your computer or device from malware.
Visit malwarezero.org to learn more about malware. Disclaimer: We used this website as a reference for this blog post.