May 7, 2025
Trending News

Malware is no longer the biggest cyber threat to SMBs

  • November 22, 2023
  • 0

Research shows that more and more cyberattacks on SMEs occur without malware. Intruders look for legitimate ways to break into companies. In his first SMB Threat Report Security

virus

Research shows that more and more cyberattacks on SMEs occur without malware. Intruders look for legitimate ways to break into companies.

In his first SMB Threat Report Security company Huntress investigates how attackers attempt to attack SMBs. The report contains a striking overarching conclusion: malware is no longer hackers’ favorite recipe. Instead, hackers try to find “legitimate” ways to bypass company security.

From malware to RMM

As many as 56 percent of security incidents observed by Huntress last quarter were no longer malware. Attackers simply want to remain unnoticed. RMM software appears to be the tool of choice: this type of software appears to be the vector in 65 percent of attacks.

RMM tools are attractive to hackers for several reasons. They are used in many organizations to carry out IT management remotely. Its use has increased significantly since the corona pandemic. The RMM platform also offers attackers a direct line to employee devices in the company that are also considered trustworthy, making it the perfect camouflage to manipulate devices unnoticed.

Protect identity

This new way of working also brings with it new challenges. We also heard this from Dave van den Heuvel of CrowdStrike BeLux, who came to the same conclusion in his recent Threat Hunting Report. “With the right permissions, you can move around unnoticed. “The attacker penetrates at the end of the security chain, so to speak,” van den Heuvel said in an interview with ITdaily.

It is no longer enough to just invest in firewalls and antivirus scanners and keep them running. Security teams must pay attention to all activity on the IT network, even if it originates from legitimate software. Protecting your digital identity should also be a top priority because attackers will try to access your authentication credentials via the cloud or your mail servers. It sounds like dogma, but enabling MFA wherever possible is the minimum that every IT user should do.

Is malware completely passé? Certainly not. Huntress sees the variety of ransomware viruses continuing to increase. Phishing remains an old golden classic, even for hackers.

Source: IT Daily

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version