Sophos releases 2019 cybersecurity threat report

PGA ransomware

Recently, Internet security company Sophos released an in-depth research report to alert Internet users and businesses about cyber threats that will emerge in the next 2019. Here are some of the main threats mentioned in the report:

PGA ransomware

  • Ransomware is the “leader”
    Unlike the traditional “Growing Web” to send a large number of malicious emails, this kind of ransomware attack is “interactive”, the publisher is no longer a machine, and the human attackers behind it will actively explore and monitor the target, and according to the situation Adjust the strategy, the victim will not give up without paying.

    In 2018, witnessed the development of targeted ransomware attacks, such as WannaCry, Dharma, and SamSam, cybercriminals have profited millions of dollars. Sophos security experts believe that this economic success will greatly stimulate the emergence of similar cyber attacks, and will occur frequently in 2019.

    If you do not conduct adequate penetration testing to improve the level of data security, ransomware will have a profound impact in the coming year.

  • Increased risk of IoT security risks
    As more devices join the Internet of Things, cyber attackers are beginning to expand their range of attacks and tools. Such as the increase in the number of illegal Android software, let ransomware turn its attention to mobile phones, tablets and other smart devices. And as homes and businesses have more and more networked devices, criminals have begun to invent new ways to hijack these devices as nodes of giant botnets, such as Mirai Aidra, Wifatc, and Gafgyt. In 2018, VPNfilter proved the weaponized IoT’s tremendous destructive power on embedded systems and network devices.

     

  • Application of chain reaction mechanism
    When a series of events occur continuously, the hacker will infiltrate the system at one of the nodes. Since a series of consecutive events do not have a clearly visible context, it is often impossible to figure out when a hacker will give a blow.

     

  • Eternal Blue has become a key tool for mining hijacking attacks
    Although Microsoft released a patch to deal with the Eternal Blue vulnerability issue a year ago, it is still a “good heart” for cybercriminals. Sophos claims that the deadly combination of Eternal Blue Vulnerabilities and mining software can cause damage.

     

For small and medium-sized enterprises, it is difficult to completely avoid these security threats, but it can still be reasonably avoided, such as establishing a security defence mechanism, using formal and effective security defence software, regulating the authority of system administrators, and treating strangers with caution or suspicious emails, use of canonical passwords, non-reuse of passwords, timely update of vulnerability patches, etc. Of course, the more convenient way is to use a trusted security service company to create a more targeted and comprehensive security solution.