News

Malware: Reporting vs. threat perception

malware threat perception

Silobreaker’s Time Series tool

 

Silobreaker gives users the power to spot developing trends early and separate valuable information from hyperbole. Three stories have hit the headlines over the last four days, each receiving different amounts of attention.

What can we learn about these threats from Silobreaker’s Time Series?

First off, it’s important to note that the amount of airtime dedicated to such stories is rarely proportionate to the danger they actually pose.

Most media outlets focus on three aspects of malware when they report it:

1) Is it new?

2) Is it (potentially) scary?

3) Is it already gaining traction?

Now, the media aren’t misguided in prioritising in such a way, however, such chatter can serve to stifle discussion about serious threats by inflating the danger of more ‘interesting’ malware.

Case in point: Mazar Bot.

Mazar Bot roots Android phones. It can read and send texts, download additional apps or wipe storage. It sends a text to an Iranian phone number confirming infection, but is probably run by a Russian gang.

All very exciting.

Yet it’s relatively difficult for Mazar to successfully infect victims.

Targeted users first have to follow a link received from an unknown contact and then install a downloaded .apk file. The file, like most mobile apps we use, will ask for wide ranging permissions to function. Only after giving Mazar these permissions will users be compromised.

So, it’s more than likely that those who get infected are either distracted or have little concept of cyber security. Yet the deluge of news about Mazar Bot over the past few days has been unending and at points, hysterical.

Meanwhile, the APT behind the Dridex banking malware was experimenting with new attack vectors.

Only when interest in Mazar Bot began to wane was it reported that the Dridex group were distributing tidal waves of spam laced with a new ransomware known as Locky.

In fact, news of Locky had appeared days earlier, just as Mazar Bot was being widely reported.

Reports state that Mazar Bot has infected 100,000 individuals in Denmark, but Locky has already hit hundreds of computers across the world.

Visibility is obviously higher on ransomware infections than data theft, but we already know how vulnerable employees are to attachments marked ‘Invoice’ or ‘CV’.

Forewarned is forearmed

While not as flashy as android malware that can wipe your drive, ransomware is more easily distributable and far more compromising – just talk to anyone at Hollywood’s Presbyterian Hospital.

The Silobreaker Team

More News

  • Silobreaker Daily Cyber Digest – 24 May 2017

    Leaks & Breaches Qatar News Agency website hacked The website of the Qatar News Agency (QNA) was hacked on Wednesday. The unknown attackers used...
  • Silobreaker Daily Cyber Digest – 23 May 2017

    Leaks & Breaches Hackers target UN staff Members of the UN 1718 committee, responsible for investigating violations of sanctions on North Korea, have been...
  • Silobreaker Daily Cyber Digest – 22 May 2017

    Malware XData ransomware proving to be effective in Ukraine In a campaign first observed last week, the XData ransomware has infected four times as...
View all News

Request a demo

Get in touch