Sunday, September 20, 2020
Home Lead Story Cybercriminals Prefer Misuse of Authentic Software During Attacks, Says Report

Cybercriminals Prefer Misuse of Authentic Software During Attacks, Says Report

Cybercriminals often misuse legitimate tools in their attacks: Report

Cybercriminals widely use software developed for normal user activity, administrative tasks, and system diagnostics to avoid getting caught quickly after carrying out their attacks, warns a new report by cybersecurity firm Kaspersky.

Almost a third of cyber attacks that the Kaspersky Global Emergency Response team investigated in 2019 involved legitimate remote management and administration tools.

In total, the analysis of anonymized data from incident response cases showed that 18 various legitimate tools were abused by attackers for malicious purposes, according to the company’s new ‘Incident Response Analytics Report’.

The most widely used one was PowerShell. This powerful administration tool can be used for many purposes, from gathering information to running malware.

cybercrime
62 percent of Indian businesses surveyed provided additional training for their staff to learn how to avoid threats while working from home. Pixabay

Another tool, PsExec, was leveraged in 22 percent of the attacks. This console application is intended for launching processes on remote endpoints.

This was followed by SoftPerfect Network Scanner, which is intended to retrieve information about network environments.

It is more difficult for security solutions to detect attacks conducted with legitimate tools because these actions can be both parts of a planned cybercrime activity or a regular system administrator task.

“With these tools, attackers can gather information about corporate networks and then conduct lateral movement, change software and hardware settings or even carry out some form of malicious action,” Konstantin Sapronov, Head of Global Emergency Response Team at Kaspersky, said in a statement.

Cyber threat
India witnessed a fall in the number of cyber crimes in 2019. Pixabay

“It is not possible to exclude these tools for many reasons, however, properly deployed logging and monitoring systems will help to detect suspicious activity in the network and complex attacks at earlier stages,” Sapronov said.

To minimize the chances of remote management software being used to penetrate an infrastructure, organizations should restrict access to remote management tools from external IP addresses, the company recommended.

Also Read: Major Goal is to Identify Planets that Could Support Life: NASA

Moreover, they need to ensure that remote control interfaces can only be accessed from a limited number of endpoints, enforce a strict password policy for all IT systems and deploy multi-factor authentication, Kaspersky said.

It is better to follow the principle of offering staff limited privileges and grant high-privileged accounts only to those who need this to fulfill their job. (IANS)

STAY CONNECTED

19,152FansLike
362FollowersFollow
1,772FollowersFollow

Most Popular

Homemade Masks Effective At Blocking Droplets By Speaking, Coughing And Sneezing

Masks made with common household fabrics help prevent the spread of viruses like Covid-19 as researchers have found that they are considerably effective at...

Get Flu Shot to Avoid Having Covid and Flu Simultaneously

Health officials are warning the public to get a flu shot this year to avoid having to deal with COVID-19 and the flu simultaneously. Both...

India Couture Week Was Digital, Virtual And Democratic

It wasn't the familiar setting of the ballroom at the Taj Palace Hotel in the Capital, neither was it the familiar parade of 'shaadi'...

India’s Top Film Industry is Telugu Film Industry: Kangana Ranaut

Actress Kangana Ranaut says she wants film industries of different states to have a collective identity, and claims she wants to save the industry...

Planning a Road trip From Delhi? Here are 5 Must-Visit Destinations

By Siddhi Jain As several countries announced nationwide lockdowns in an effort to flatten the curve and break the chain, the coronavirus jolted the entire...

Top 10 Must Visit Places In Himachal Pradesh, India

Himachal Pradesh, in India, is a picture-perfect state that impresses tourists with scenic hill stations, quaint villages, snow-covered mountains, lush valleys, diverse flora and fauna,...

Here Is the Kind of Internet Connection That You Need for Your Browsing

For household and commercial use, everyone is looking out for the best internet connection. The internet has immensely evolved with time, and a need...

Here’s How Dinosaurs Caused Mammals to Develop Night Vision

By JoEllen McBride When dinosaurs ruled the earth, life was tough for our mammalian ancestors. So they learned to hunker down during the day and...

Recent Comments

Donate to NewsGram to support quality journalism.
x