Deception / 02.21.2018

Hackers are putting the pedal to the metal with new and advanced technique

Cyber security teams in large enterprises are now understanding that they need an additional element of defense against:

a. Malware that continues to get smarter and more sophisticated
b. Gaps in security that stem from adoption of new IoT devices.

Let’s talk a little about advancement in malware strategies that hackers deploy against their victims.

In the last few months, malware has evolved in many levels and according to new report by Cisco, “the evolution of malware was one of the most significant developments in the attack landscape in 2017.”

Hackers are automating ransomware cryptoworms, eliminating the need for the human element in launching ransomware campaigns. This allows hackers to scale their attacks.

Many hackers aren’t even after ransom, they just want to destroy systems and data. An example of this is Nyetya—wiper, a type of malware who pretends to be ransomware and then destroys your precious data.

“Self-propagating malware is dangerous and has the potential to take down the Internet” is what Cisco’s threat researchers believe.

But what about the gaps in IoT devices?

Hackers know that IoT devices are a goldmine. They can use the internet capabilities of these usually unsecure devices and through them, compromise secure networks.

While large enterprises rush to get the latest devices into their business, (security cameras, smart printers, phone systems, thermostats, etc.) hackers are exploiting the gaps in the security of these devices, many of which also use cloud services.

An alarming aspect of this problem is that many organizations that are vulnerable to attacks, are slow to adapt their security posture or even have not mapped out what devices they need to secure.

In the meantime, IoT botnets are getting smarter by becoming more mature and automated. As they grow, hackers are using them to launch more advanced distributed-denial-of-service (DDoS) attacks.

Why does this happen and how can we stop them?

This mainly happens because there is an overall lack of understanding within the organization of who is responsible for the security of the IoT devices. Another reason is because the organizations have a tremendous difficulty defending both the IoT and the cloud environments.

How does TrapX solve this problem?

TrapX uses deception to get clear visibility across your entire network. Deception traps will find lateral hacker movements to or from any IoT devices. If a hacker even tries to move within your network, they will trigger a deception network trap. This makes deception a leading cyber defense technology to secure IoT and connected devices.

Download the Cisco report today to learn about the latest trends in cyber security.

We’d love to hear from you as well! Please let us know if you have any questions for us, were always here to help.

Learn more about our unique approach to Deception

Discover why more than 300 global customers call TrapX "simple, powerful, and affordable."