BadRabbit and other viruses extortionists: how to protect yourself and your business
Technologies / / December 19, 2019
Companies and Internet users finally realized the danger posed by cyber attacks, and began to take steps to protect their data. But sooner or later the hackers find new vulnerabilities - it's just a matter of time.
It is necessary to recognize the attack and take action. This is extremely important because there is a new hacking technique, called "bodiless cyber attack."
With the new method, hackers can bypass the anti-virus software and corporate firewalls so that no one will detect hacking. The new technology is dangerous because a hacker penetrates the corporate network without the use of malicious files.
An attacker can easily gain access to the computer and full control over the operating system, using software vulnerabilities. Once a hacker penetrated the network, it will introduce a code that can destroy or capture sensitive data, leaving no trace. A hacker can, for example, to control the operating system tools such as Windows Management Instrumental or PowerShell.
"Quiet risk"
Despite the evident progress in the area of cyber security, hacking technologies are developing at such a high speed that allows hackers to adapt and modify their tactics is literally on the move.
It increased the number of bodiless cyber attacks over the past few months, which is extremely worrying. Their effects can be more damaging than a simple extortion.
Bank of England's Prudential Control Department called such attacks "low risk". The people who are behind the attack, pursue different objectives: to gain access to intellectual property, privacy, or strategic data.
Those who are engaged in the development of antivirus software probably will not be surprised that hackers have come up with such a sophisticated approach. It allows you to attack without the use of conventional executables. Indeed, similar results can be achieved by introducing malicious code in most PDF or Word files ordinary.
Companies and organizations that are working on an older operating system, practically begging to be attacked. Older operating systems are not supported by the manufacturer and do not update anti-virus software. It goes without saying that when the software stops the release of the update, the computer becomes an easy target for hackers.
Protection against threats
It has long been impossible to rely on the old methods of protection. If organizations want to resist the new attacks, it is necessary to develop a policy within the company, which will be aimed at reducing the risk of attacks bodiless.
So here's what you need to do.
- To invest in plant and equipment protection, such as a high-quality end encryption, two-factor authentication and the latest anti-virus software with regular updates. Pay close attention to the search for vulnerabilities in the company's computer security system.
- Outdated and faulty anti-virus programs in most cases ineffective. For example, only 10 out of 61 antivirus programs were able to stop the attack NotPetya.
- rules should be developed to control and restrict access to administrative resources among employees.
Keep in mind that the lack of knowledge about the existing security threats can cause great damage to the organization. Information about cases bodiless attacks should be published in the news, blogs, on the official website of the company, otherwise we are waiting for another large-scale hacker attacks, such as WannaCry.
Nevertheless, all organizations and companies need to understand that technology is constantly being improved burglary and stop cyber-attacks will not work forever. It should identify the potential dangers and seek a solution in accordance with the circumstances of the attack.