![]() ![]() “An effective defense against the increasing abuse of legitimate internet services demands a nuanced approach, grounded in a comprehensive and systematic understanding of which and how these services are abused across diverse malware categories and threat actors,” said Julian-Ferdinand Vögele, a threat intelligence analyst with Recorded Future’s Insikt Group. The goal is to help those tasked with defending networks better understand how such services are used and abused within their environments, hopefully helping them take a more refined and proactive approach to detections. ![]() That cybercriminals and state-aligned hackers abuse legitimate web services - such as email providers, messaging services, social media platforms, photo sharing sites, and file storage and transfer services - as part of their operational infrastructure has been studied for years.īut in an analysis from Recorded Future’s Insikt Group, shared exclusively with CyberScoop, researchers attempted to categorize what types of malware most frequently abuse such services and how, offering a window into the current state of play based on activity observed in 20 on the Recorded Future Triage sandbox platform, as well as outside sources. Criminal hackers have always abused legitimate web services such as Gmail and Facebook to do their bidding, but increasingly they are finding new ways of blending into popular applications to avoid detection and find unsuspecting victims.Īn analysis of more than 400 malware families deployed over the past two years found that at least a quarter of them abused legitimate internet services in some way as part of their infrastructure, allowing malicious hackers to more easily blend in with normal traffic and complicating the job of those tasked with defending networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |