Did you know that in most cases, you do not realize when you have been hit by malware?
At least the site that has been said to be the source for a recent attack on Facebook, Apple and Twitter, claims to have known nothing of being compromised before reading about the security breaches on the news. Bloomberg.com tells the iPhone software development site was most likely used for a waterhole attack by East-European criminals.
Most malware programs use the vulnerabilities in popular software to get installed so that you do not even recognize the threat. New exploits are detected around the world all the time, and for example Java is usually at the top of the targeted software list. The amount of malware is alarmingly high, almost 60% of respondents of a Ponemon study confirmed over 25 malware incidents in their environments each month.
Sophisticated malware contaminates your pc or mobile just by a visit to an infected website, by opening an Office document, pdf or other document with an exploit. You will not notice anything peculiar. The days of the very obvious spam mails with malware in them is over. Today, the mails and sites with infection look just as original and trustworthy as any other and you would be “happily” unaware of anything out of the ordinary going on. Until the reality hits in and the repercussions of the attack get real.
The biggest amount of vulnerabilities comes not from the operating system, but from 3rd party software. Exploit kits are in the wild only a few moments after a fix to a vulnerability is released.
Administrators currently don’t necessarily have visibility to what 3rd party software is installed. Keeping up with all the patches and updates for all used software, and making the necessary updates takes a lot of time and effort. For example, this June alone, my colleagues counted well over 100 vulnerabilities just in the most common software for Windows workstations.
To make it more challenging, usually, after all the necessary updates are done, the admin has to start it all over again when new security updates are available. Often as soon as the next day…
The F-Secure experts can offer a solution: Software Updater not only studies the available patches, but also installs security updates automatically and covers both the operating system and 3rd party software. However, administrators can easily define exclusions for the automatic mode if and when necessary.
Are we still calling this outbreak Petya? Yes. Microsoft Defender detected it as "Petya.A". "We…
June 28, 2017