Hunter-killer: how a simple malware can neutralize firewalls and antivirus programs

Teacher

Professional
Messages
2,677
Reputation
9
Reaction score
619
Points
113
The new generation of malware is aimed not at bypassing detection, but at completely destroying the protection of enterprises.

Over the past year, the number of incidents aimed at disabling corporate protection has significantly increased in cyberspace. This is stated in the annual report Red Report , published by Picus Security.

The report revealed a significant increase in the ability of attackers to detect and neutralize modern security systems, including new-generation firewalls, antivirus software, and EDR solutions.

Specialized malicious software, which is responsible for disabling companies ' security systems, was designated by Picus Security under the general name "Hunter-killer" ("hunter-killer") and noted an increase in the use of such programs by 333% over the past 12 months.

Suleiman Ozarslan, co-founder and vice president of Picus, stressed that such a significant increase was a surprise, since previously such software was not even included in the TOP 10 threats. This highlights the shift of hackers to use more destructive and dangerous tools, presenting a serious challenge for information security professionals.

The report, based on an analysis of more than 600,000 malware samples identified in the wild (ITW), suggests that criminals are adapting their tactics in response to the growing cybersecurity of enterprises and the widespread use of tools with advanced threat detection capabilities.

Now, this behavior is observed in about a quarter of all malware samples and is used by almost every group involved in ransomware and advanced attacks.

Callie Gunter, Senior Manager of Cyber Threat Research at Critical Start, noted that the emergence of Hunter-killer software is a significant evolution in cyber threats, requiring the information security industry to adopt more dynamic and proactive protection mechanisms.

To counter this threat, the report advises organizations to use machine learning, protect user credentials, and regularly check their security systems for relevance in the face of the latest tactics and techniques of cybercriminals.

Special attention is paid to the need to use behavioral analysis-based protection systems, since many attackers use legal tools to achieve their goals, which are often impossible to detect using signature-based antivirus software.

The report also highlights that 70% of the malware analyzed uses stealth techniques, including to circumvent security measures and ensure resilience in networks. And the 150% increase in the use of obfuscated files or information and the 176% increase in the use of application-level protocols for double ransomware only highlights the trend towards more complex attack detection, analysis, and incident response.

In addition, organizations should focus not only on technical means of protection, but also on creating a culture of awareness about cyber threats, training staff in the basics of cybersecurity and risk management.

The key to countering ever-evolving threats lies largely in changing people's thinking so that they take full responsibility for security in the digital environment.
 
Top