As a CISO or CEO of a business, it's your job to protect the company from all potential attacks – including malware. Malware is one of the most prominent security threats businesses face today, and hackers are constantly coming up with new ways to try and gain access. Fortunately, there are several steps you can take to help you spot – and stop! – malware in its tracks. In this blog post, we'll explore 6 powerful techniques that will make sure your data stays safe - even against the most determined hackers. Ready? Let's get started!
A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or of otherwise annoying or disrupting the victim.
Malware is malicious software, which - if able to run - can cause harm in many ways, including but not limited to:
An Australian man was recently charged with creating and stir busting a Remote Access Trojan software kit. The software was either installed on victims’ machines when they opened an email or when they clicked a link in an email. Once installed the malware could control the user computer without them knowing. This gave the man access to do things like turning on webcams and capturing what they typed into their keyboard.
According to the Australian Federal Police the young man engaged with a network of individuals and sold the spyware, named Imminent Monitor (IM), to more than 14,500 individuals across 128 countries.
He sold it 201 times in Australia and of those sales 98 were paid through PayPal. Of these 98, 15% were purchased by either a) a person who had been involved in a domestic violence event (14) or b) was a registered child sex offender (1). Not great!
While covering you webcam with a high-tech device called a post-it note may protect your privacy (to some extent) others ways to protect yourself include:
Recommended practices for avoiding malware incidents include:
Organisations should also implement other host hardening measures that can further reduce the possibility of malware incidents, such as the following:
Here are some steps that your organisation or network could take if it is already infected with malware to minimise the impact:
The NCSC has jointly published an advisory: Technical Approaches to Uncovering and Remediating Malicious Activity, which provides more detailed information about remediation processes.
And if you are really keen you can read NISTs 101 page guide to Malware Incident Prevention and Handling.
Malware has become the greatest external threat to most hosts, causing damage and requiring extensive recovery efforts within most organisations. The following are the classic categories of malware:
A virus self-replicates by inserting copies of itself into host programs or data files. Viruses are often triggered through user interaction, such as opening a file or running a program. Viruses can be divided into the following two subcategories:
A compiled virus is executed by an operating system. Types of compiled viruses include:
Interpreted viruses are executed by an application. Within this subcategory:
A worm is a self-replicating, self-contained program that usually executes itself without user intervention. Worms are divided into two categories:
A Trojan horse is a self-contained, nonreplicating program that, while appearing to be benign, actually has a hidden malicious purpose. Trojan horses either replace existing files with malicious versions or add new malicious files to hosts. They often deliver other attacker tools to hosts.
Malicious mobile code is software with malicious intent that is transmitted from a remote host to a local host and then executed on the local host, typically without the users explicit instruction. Popular languages for malicious mobile code include Java, ActiveX, JavaScript, and VBScript.
A blended attack uses multiple infection or transmission methods. For example, a blended attack could combine the propagation methods of viruses and worms.
Many, if not most, instances of malware today are blended attacks. Current malware also relies heavily on social engineering, which is a general term for attackers trying to trick people into revealing sensitive information or performing certain actions, such as downloading and executing files that appear to be benign but are actually malicious. Because so many instances of malware have a variety of malware characteristics, the classic malware categories listed above (virus, worm, etc.) are considerably less useful than they used to be for malware incident handling. Once upon a time, there used to be very different procedures for handling incidents of each malware category; however now there is largely one set of procedures and policies for handling all malware incidents, thus nullifying the primary need for having categories.
At the helm of our privately owned, global RegTech firm are industry experts who understand that security controls should never get in the way of business growth. We empower companies large and small to remain resilient against potential threats with easily accessible software solutions for implementing information security governance, risk or compliance measures.
We don't just throw a bunch of standards at you and let you try and figure it out! We have designed a thoughtful way of supporting all businesses consider, articulate and develop security controls that suit the needs of the organisation and provide clever reporting capability to allow insights and outcomes from security assessments to be leveraged by the business and shared with third parties.
Our platform places customers at the heart of our design process, while providing access to expert knowledge. With simple navigation and tangible results, we guarantee that all data is securely encrypted at-rest and in transit with no exceptions – meeting international standards with annual security penetration testing and ISO 27001 Certification.