One of the leading cyber attack methods is malware infection. According to a report by IBM X-Force, malware attacks increased 200% in 2019. Malware attacks are growing more sophisticated, and many attacks cannot be stopped by signature-based legacy antivirus. This article will provide an up-to-date definition of malware, its types and attack patterns, and some advanced protection techniques against malware infection in your organization.
Malware, or “malicious software,” is a general term describing any program created to disrupt or unlawfully retrieve information from a computer system.
Attackers use malware to invade, damage or disrupt computer systems, networks, and devices. Their goal may be data exfiltration, direct financial gain, corporate espionage, revenge or sabotage (for example in the case of disgruntled employees), or hacktivism.
Types of Malware
The most common types of malware are:
Adware—disguises itself as a legitimate program or is attached to another application. Once installed it serves ads either directly or through a browser. It may also be able to steal your data or infect other connected systems.
Spyware—often attached to legitimate programs, it observes the user’s activities without permission and reports to the attacker.
Trojan horse—disguises itself as a useful program or code so you can install it on your system. The attackers then use the Trojan to steal sensitive information or install additional malware to gain deeper control of the system.
Ransomware—encrypts files or locks users out of a system, asking them to pay a ransom, typically in cryptocurrency, to regain access. There is no guarantee that attackers will release the files even after the ransomware is removed.
Rootkit—gives the attacker administrator or root privileges on an infected system. Once inside, an attacker can move laterally through a network or create additional entry points.
Exploits—take advantage of vulnerabilities in a system, allowing the attacker to penetrate or take control. This is often linked to adware, or malvertising, which uses a legitimate site to execute code from a malicious site, enabling an illicit drive-by installation on the user’s device.
High-Profile Examples of Malware Attacks
Wannacry
In 2017, WannaCry infected more than 200,000 computers in more than 150 countries. This ransomware affected a wide range of industries, including organizations like the UK National Health Service, FedEx, Renault, Spain Telecom and several gas companies. Worldwide financial damages from the attack worldwide were estimated at $4 billion.
NotPetya
The makers of NotPetya targeted the entire country of Ukraine. This infrastructure breach resulted in the disruption of public services, including airports, public transit, the police, and even the central bank. The attack impacted the national economy, civil welfare, and national security.
Zeus
Zeus ia banking trojan, especially designed to steal confidential banking data. Zeus is responsible for almost half of banking attacks, infecting 3.6 million computers in the U.S. In 2010 the FBI cracked down on the criminal ring operating Zeus, and arrested 100 individuals related to the malware in the USA, UK and the Ukraine.
Kaptoxa
Kaptoxa is a POS trojan; it steals customer data used in electronic transactions involving debit and credit cards. This trojan was behind the Target data breach, which exposed the data of more than 70 million customers of the large USA retailer. Kaptoxa managed to remain undetected in Point of Sale systems for days, increasing the damage caused. The Target breach is said to have a milestone that caused payment processors around the world to switch from traditional magnetic cards to smart chip-based payment cards.
Stop advanced cyber
threats with one solution
Cynet’s All-In-One Security Platform
Full-Featured EDR and NGAV
Anti-Ransomware & Threat Hunting
24/7 Managed Detection and Response
Achieved 100% detection in 2023
Rated 4.8/5
2024 Leader
How to Protect Against Malware
A strong security posture starts with a layered threat detection and prevention approach. There are a number of essential components of a secure corporate environment:
Endpoint Protection
Use an endpoint protection solution that provides not only legacy antivirus, but also Next-Generation Antivirus (NGAV). NGAV can detect and prevent malware that does not match a known binary signature, as well as fileless attacks that execute in memory or via network protocols without downloading a file to the target device.
Control Privileges
Control privileges on endpoints, servers, even administrator accounts, using the least privilege principle. Rigorously audit user accounts to ensure you remove old or unused accounts, roles and permissions. This makes it more difficult for attackers to penetrate devices to install malware in the first place, and makes it more difficult for them to escalate privileges and perform lateral movement, once malware is already inside.
Vulnerability Protection
Software vulnerabilities are one of the most likely entry points into your organization. Use vulnerability scanning tools, update and patch software across the organization, and install security patches as soon as they are available. You will not be able to prevent all vulnerabilities, so perform periodic audits of your software, conduct risk assessment and use penetration testing techniques to evaluate which vulnerabilities are the most severe.
Social Engineering Protection Social engineering is another key entry point into your security perimeter. Attackers realize that human employees are often the weakest link of the security chain. Train employees on an ongoing basis about the risks of social engineering and how to detect attacks like phishing and pretexting. Use tools that can automatically identify and block suspicious links in emails and other messages.
Threat Intelligence
Use threat intelligence feeds to keep on top of threats, and integrate knowledge of threat actors and attack techniques into your cyber defenses. Threat intelligence can help you understand if a certain Indicator of Compromise (IoC) is linked to a specific type of malware, who built that malware, and what Tactics, Techniques and Procedures (TTP) the attacker is likely to use.
Malware Prevention, Detection and Mitigation with Cynet 360
Malware protection requires a multi-layered security approach. Cynet 360 is a security solution that includes Next-Generation Antivirus (NGAV), a device firewall, and Endpoint Detection and Response (EDR) capabilities that help security teams respond to malware attacks when they happen. It also offers network analytics, behavioral analytics and deception technology, to help capture attackers whatever vector they use to penetrate your network.
Cynet’s platform includes:
NGAV—blocks malware, exploits, LOLBins, Macros, malicious scripts, and other known and unknown malicious payloads.
Zero-day protection—uses User and Entity Behavior Analytics (UEBA) to detect suspicious activity and block unknown threats.
Monitoring and control—asset management, endpoint vulnerability assessments and application control, with auditing, logging and monitoring.
Response orchestration—automated playbooks and remote manual action for remediating endpoints, networks and user accounts affected by an attack.
Deception technology—lures attackers to a supposedly vulnerable honeypot, mitigating damage and gathering useful intelligence about attack techniques.
Network analytics—identifying lateral movement, suspicious connections and unusual logins.
In my experience, here are tips that can help you better protect against modern malware attacks:
Implement “endpoint detection and isolation” (EDI) Beyond endpoint protection, add tools that can automatically isolate compromised endpoints from the network when suspicious activity is detected. This prevents malware from spreading laterally while allowing investigators to analyze the incident safely.
Employ continuous vulnerability assessment and prioritization Use automated tools that continuously assess your environment for vulnerabilities and provide prioritization based on active exploitability. This ensures you address high-risk vulnerabilities before they can be weaponized by malware like ransomware.
Integrate deception technology to confuse and delay attackers Deploy decoy systems (honeypots) or credentials within your network to detect and divert malware operations. These tactics can slow down attackers, buy you time to respond, and provide valuable insights into their methods.
Deploy multi-factor authentication (MFA) on sensitive systems Strengthen access control by deploying MFA for sensitive applications and critical systems, such as finance or HR. Ensure MFA is resistant to malware that intercepts traditional methods like SMS-based codes by using app-based or biometric authentication.
Conduct real-time threat hunting for fileless malware Since many advanced malware strains operate filelessly, traditional antivirus tools may miss them. Use threat hunting tools to proactively search for in-memory malware or unusual process behaviors that could signal the presence of fileless threats.
Eyal Gruner is the Co-Founder and CEO of Cynet. He is also Co-Founder and former CEO of BugSec, Israel’s leading cyber consultancy, and Versafe, acquired by F5 Networks. Gruner began his career at age 15 by hacking into his bank’s ATM to show the weakness of their security and has been recognized in Google’s security Hall of Fame.