|
Moreover, in many cases, modern programs encrypting user data have many modules and, in addition to blocking access, they can also, for example, steal victims' information. Threats to business - it can be scary... let the numbers speak for themselves: in ) company computers were exposed to an Internet attack at least once, and the use of standard office applications in attacks was three times more frequent than in the case of home users. Company computers were the target of local threats, the source of which were, for example, infected USB sticks or other removable media. We also detected a seven percent increase in the share of malicious programs exploiting security vulnerabilities (so-called Exploits) created for Android.
Which confirms the growing interest of cybercriminals in data stored on employees' mobile devices. Even though attacks of this type are relatively new, they cannot be said to be primitive - cybercriminals have done their homework and have previously examined the Mobile App Development Service contacts and suppliers of the attacked companies, as well as the private interests and Internet activity of individual employees. legitimate websites to be infected and spread malware. And if that wasn't enough, these attacks were repeated many times to increase the probability of success. Where is the most money in the bank in.

Cybercriminals paid a lot of attention to organizations offering financial services such as banks, investment funds, stock exchanges and currency exchange offices, including those supporting cryptocurrency. All this according to the principle - if you want to steal, do it where they have the most money.An example of such an attack was carbanak, where malware infiltrated bank networks, searching for critical systems that would allow cybercriminals to withdraw money. In one successful attack, attackers were able to steal up to millions of dollars. Another target of business financial cyberattacks in Our experts have identified ten families of malicious programs designed to steal data from POS terminals.
|
|