Page 15 - AeM_September_2020
P. 15
RESEARCH
ANALYSIS
TRENDS
Fileless malware continues to grow
The effective and timely identification of malware is one specifically targeting MacOS and there is a tendency
of the greatest challenges for IT security today. This is for cyber criminals to focus more and more on Apple's
not least due to the sheer number of new malware Mac platform, which points to further increase in
variants but also to their sophisticated obfuscation, MacOS-specific malware.
which overwhelms conventional signature-based
protection technologies. Ransomware is becoming more personalized
Mainly fileless malware is a growing problem here At least since the large-scale, global WannaCry and
since it is not tied to executable files and leaves little or NotPetya campaigns in 2017, we know that
no traces on the hard drive. Above all, memory-based ransomware is a serious problem that is difficult to
malware attacks are popular with hackers, which is control. This will not change in in the near future either,
active in the main memory, sets up command channels on the contrary: we are seeing that ransomware attacks
there and then carries out operations independently, are becoming increasingly personalized and more
such as downloading further Trojans. targeted - be it that ransomware is developed for
specific countries or industries or that attackers encrypt
Prominent representatives of fileless malware are the particularly valuable or sensitive data instead of simply
Trojans Emotet and Trickbot, which will continue to coding everything in an uncontrolled manner.
keep IT staff busy this year, as effective endpoint
protection technologies are still not being used Automation is becoming indispensable in security
comprehensively. Today’s security managers face the great challenge of
Growing threat potential from MacOS having to monitor and protect every corner of their
network - from the endpoint to the cloud. Departments
For many years now, MacOS has had a reputation for that rely on passive threat detection quickly reach their
being a relatively attack-proof operating system. The limits since they must manually correlate, analyze, and
Apple OS is considered to be far less susceptible to evaluate an almost infinite amount of data. In times of
malware and cyberattacks than the market leader shortage of skilled workers, overworked IT teams and a
Windows. Although the majority of malware is still complex threat landscape, this is Sisyphean labor.
targeting Windows and Linux, Mac users should not Therefore, protection solutions based on automation
underestimate the threat situation either since they are should be at the top of a CI(S)O priority list, regardless
not immune to compromises or dangerous infections of whether it is about endpoint security, password and
either: the security researchers at SentinelOne identity management or data analysis. (Source:
identified at least ten malwares of various types SentinelOne) ◊
By MediaBUZZ
15 September 2020: Cybersecurity & Data Safety: perpetual awareness and innovation