Recent Malware Attacks and Security Breaches have become a major security concern for business all around the world. We have compiled a list of recent malware attacks, their effects, and their prevention. Read on to know how you can prevent yourself from such malware and if affected what should be some damage control practices.
1. Your Browser Could Be Mining Cryptocurrency For Strangers
How To Protect:
- You can add sites you’re worried about, or ones that you know practice in-browser mining, to your browser’s ad blocking tool.
- There’s also a Chrome extension called No Coin, that blocks Coinhive mining and is adding protection against other miners, too.
2. Your wi-fi enabled gadgets just got more Scary!
The KRACK vulnerability allows malicious actors to access a WiFi network without the password or key. They can steal information like credit card numbers, passwords, and any emails that are transmitted over WiFi networks, modify the traffic amongst network, infect your device with an unknown malware, they can do all this without even being in the network. Everyone and anything using WiFi is at risk.
How to protect your devices from KRACK:
- Install the automatic updates available on the device.
- Don’t rush to change the password just yet. If there are security updates available on the router, now is the time to update the device.
- You can find a running list of companies that have provided patches here.
3. Reaper IoT Botnet
The latest botnet threat IoT Troop/Reaper has already affected a million networks and counting. It uses known security flaws in the codes of machines like checking for open doors, using hacking techniques with the help of compromising tools to break into system and then spread itself further
This attack has compromised IoT security by affecting routers from D-Link, Netgear, and Linksys, as well as Internet-connected surveillance cameras, including those sold by companies like Vacron, GoAhead, and AVTech.
How to Protect:
- Everyone using wi-fi enabled gadgets should check the company’s list of affected gadgets.
- Analysing IP traffic from devices can reveal if they’re communicating with the command-and-control server helmed by the unknown hacker that’s administering the botnet.
- Install latest updates and patches in your devices, home network router, and surveillance camera systems.
- You can perform a factory reset on devices, which might wipe the malware.
4. Supply chain security problem in Softwares
Hackers have been targeting attacks in the software supply chain by sneaking malware into downloads from vendors even trusted ones. Hence the malware is installed long once you click the install button. Hackers sabotaged the popular, free computer-cleanup tool CCleaner in the last month, by inserting a backdoor into updates to the application that landed in millions of personal computers. Three times in the last three months, hackers have exploited the digital supply chain to plant tainted code that hides in software companies’ own systems of installation and updates, hijacking those trusted channels to spread their malicious code.
How To Protect:
- Investigate the internal security practices of the companies whose software you use
- Read up on different applications to determine if they’re created with security practices that would prevent them from being corrupted.
- Look for alternatives with better security protections
We help our clients with intelligent technical solutions and innovation. With recent malware attacks happening, we are offering a Free Security Audit. Read more on latest tech news, new solutions, and innovations.