Blog Layout

Hackers Delivering And Hiding Malware While Undetected

sccomputerguys • May 08, 2021

Last year, Google made some important changes to their Chrome browser in a bid to increase user security.

Among these changes was to default to "HTTPS" in the browser in an attempt to reduce the number of "man in the middle" and similar types of attacks.

Their strategy worked.

Other companies adopted Google's approach and HTTPS became the new standard on the web, and user security was increased. That's a very good thing.

Unfortunately, we are now learning, courtesy of data collected by Sophos, that hackers are increasingly taking advantage of TLS (Transport Layer Security) to hide their own activities. Last year, Sophos reported that some 24 percent of malware was using TLS to communicate. This year, that value is up to 46 percent.

Where malware is concerned, there are, broadly speaking, three types of communication: downloading additional malware, exfiltration of data, and command and control. By using TLS when engaging in all three of these, hackers make it significantly more difficult for IT security professionals to detect, and ultimately to stop their malicious activity.

While user security has unquestionably increased over the last year, so too, has the security of hackers, and it's complicating the lives of IT folks around the world.

Unfortunately, there's not much that can be done about it. Anything that helps the general public by definition, can also be used by hackers around the world to help themselves, so it shouldn't come as a great surprise that they're increasingly embracing TLS. The first rule of hacking is, after all, 'be at least two steps ahead.' They are, and that's unlikely to change in the foreseeable future.

For now, the best you can do is be mindful of the fact that hackers are increasingly taking advantage of TLS. Forewarned is forearmed. Good luck out there.

By sccomputerguys 22 Jul, 2022
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN ...
By sccomputerguys 21 Jul, 2022
Do you use Microsoft Teams?  If so, you'll be thrilled to know that the Redmond Giant is continuing to pour resources into improving the software with a specific focus on audio and ...
By sccomputerguys 20 Jul, 2022
Corporate branding can be worth its weight in gold and certain images are absolutely iconic.  The Golden Arches, the Nike "swoosh," and Apple's Apple all come to mind. Logo images give companies ...
By sccomputerguys 19 Jul, 2022
Remember the Heartbleed scare we had a couple years back?  It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent ...
By sccomputerguys 18 Jul, 2022
Microsoft Exchange servers are once more in the crosshairs of hackers around the world.  Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware ...
By sccomputerguys 16 Jul, 2022
If you grew up in the days before the internet, it's absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember ...
By sccomputerguys 15 Jul, 2022
It may seem as though Internet Explorer is the browser that will not die, but according to Microsoft, it is now a step closer to breathing its last virtual breath. Microsoft has ...
By sccomputerguys 14 Jul, 2022
If you're involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds ...
By sccomputerguys 13 Jul, 2022
These days, companies spend significant sums of money to protect themselves from cyber criminals.  The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies ...
By sccomputerguys 12 Jul, 2022
Do you receive healthcare of any kind from Kaiser Permanente?  If so, be aware that they recently published a data breach notification indicating that an unidentified attacker accessed an email account that ...
More Posts
Share by: