:quality(85)/cloudfront-us-east-1.images.arcpublishing.com/infobae/Z66XEAHYYBBAZGN24YJZZZCKUM.jpg%20420w,https://www.infobae.com/new-resizer/0H8hPOwcagijxwfHldVrSrGknOM=/768x512/filters:format(webp):quality(85)/cloudfront-us-east-1.images.arcpublishing.com/infobae/Z66XEAHYYBBAZGN24YJZZZCKUM.jpg%20768w,https://www.infobae.com/new-resizer/BUQNRoqJQAMs8fCgZSmqh-m6kdM=/992x661/filters:format(webp):quality(85)/cloudfront-us-east-1.images.arcpublishing.com/infobae/Z66XEAHYYBBAZGN24YJZZZCKUM.jpg%20992w,https://www.infobae.com/new-resizer/MrgC-kc1JHyCtSDfyCudsi7JlHc=/1200x800/filters:format(webp):quality(85)/cloudfront-us-east-1.images.arcpublishing.com/infobae/Z66XEAHYYBBAZGN24YJZZZCKUM.jpg%201200w,https://www.infobae.com/new-resizer/Bvw1ShYmF03xXyGdIYnUl0G599s=/1440x960/filters:format(webp):quality(85)/cloudfront-us-east-1.images.arcpublishing.com/infobae/Z66XEAHYYBBAZGN24YJZZZCKUM.jpg%201440w)
The cyber criminals use different alternatives to carry out malicious activities, from exploiting misconfigured databases, to socialization techniques to trick employees into obtaining information or access permissions, a vulnerability in technology used by the organization or provider, or the use of weak and easily identifiable systems.
ESET states that although the ransomware is a particular kind of malware that concerns organizations due to its reputation and economic impact, is not the only form of cyber threat, rather, it is mainly aimed at companies. Next, top 5 corporate threats that highlights the company software specialized in cyber security:
1. Data leak or exposure
It is caused by improper access to the organization’s systems. While on the network, some threat actors manage to avoid radar detection and conduct reconnaissance missions, seek out sensitive information to steal, and gain access to more important and valuable information. Initial ways of accessing a victim’s system vary, as attackers can use different vectors for their task.
While information leaks or disclosures can be the result of a variety of threats, such as a hack phishing malware download or brute force attacks, leaks are also caused by human error, such as a database misconfiguration or someone within the organization accessing the organization with unnecessary permissions and Sharing confidential information by mistake or intentionally.
2. Social engineering
Social engineering has evolved, today there are many attacks that use bot voice to steal verification codes, campaigns of vishing via messaging apps like WhatsApp to call potential victims, but also through text messages.
The same thing happens in the social networkswhere attackers not only use fake profiles posing as friends, work contacts or organizations, but also employ techniques using software programs to extract follower information and thus capture certain user profiles.
Another thing to keep in mind is scams of a Business Email Compromise (BEC). The attackers pose as an executive or CEO of a company and demand, for example, an urgent transfer to a supplier.
Attacks have also begun to be reported deep fake Y deep voice, where attackers use software based on artificial intelligence to impersonate real people through images and/or voices.
:quality(85)/cloudfront-us-east-1.images.arcpublishing.com/infobae/7DJTBSX5AZAEVMBTPXNPERTLLM.jpg%20992w)
3. Brute force attacks
One of the most common ways cybercriminals use to gain access to corporate systems is through the use of brute force attacks.
Its goal is to crack the weak credentials of services exposed to Internet to gain access to the victim’s network and then perform other malicious actions, such as stealing information or deploying harmful malware. There are different types, like for example 2 of them:
– Password spraying.
– Credential stuffing.
For it, cybercriminals use software, hardware and databases (from dictionaries, from the most common passwords to leaked credentials from past breaches) that allow them to automatically check username and password combinations until they find valid credentials for certain services.
It is important to note that the use of weak passwords is a common practice and easy to root, so TechMarkup recommends read this note to create a password as secure as possible.
4. RATs, Remote Access Trojans
This type of malware is very dangerous for organizations due to its ability to spy and steal information. Through the command sent remotely you can:
– Steal saved credentials in the Web navigator and of messaging apps.
– Run keylogger, which record keystrokes.
– Carry out screenshots.
– Take pictures from the camera of the computer either laptop.
– Register the Audio.
– Intercept communications
– Download other malware in the device.
There are several active RATs, some of the most used by cybercriminals are Agent Tesla, njRAT, WSHRAT, Remcos, among other. They are often distributed via phishing campaigns that include malicious attachments or links, via fake apps or installers, and more.
:quality(85)/cloudfront-us-east-1.images.arcpublishing.com/infobae/MZFSBTBB6NC27OVSLTMOS5R5NI.webp%20420w,https://www.infobae.com/new-resizer/0aQ_Yo3o_t5PIxCxBaiPLmGvytM=/768x341/filters:format(webp):quality(85)/cloudfront-us-east-1.images.arcpublishing.com/infobae/MZFSBTBB6NC27OVSLTMOS5R5NI.webp%20768w,https://www.infobae.com/new-resizer/uhlOoq77kC3w28h58kxR9do18jc=/992x441/filters:format(webp):quality(85)/cloudfront-us-east-1.images.arcpublishing.com/infobae/MZFSBTBB6NC27OVSLTMOS5R5NI.webp%20992w,https://www.infobae.com/new-resizer/FrysI2YmAVpXGGNUPHrtS6qnOKc=/1200x533/filters:format(webp):quality(85)/cloudfront-us-east-1.images.arcpublishing.com/infobae/MZFSBTBB6NC27OVSLTMOS5R5NI.webp%201200w)
5. Supply chain attacks
Another threat that organizations must consider is the supply chain; that is, if you are adequately prepared to face the consequences of an attack against a provider whose security management is beyond your reach.
Usually these attacks take advantage of existing vulnerabilities in software vendors and distributed malicious actors, such as an update or app malicious, resulting in customer engagement from that vendor.
This allows cybercriminals to have a greater reach, as opposed to an attack that targets a single organization, engaging multiple businesses in the same campaign.