![how can i get infected by kaseya agent how can i get infected by kaseya agent](https://nestia-food.obs.ap-southeast-3.myhuaweicloud.com/202111/18/ada409eb00b11e3963d927132c4e45c0.jpg)
So, that was one of the good stories that came out of this year. Talk to us a little bit about perhaps one of the more infamous malware-as-a-service groups, namely: Emotet. Fraser, I just want to jump back to something you mentioned earlier about these criminal operations where there’s a service that’s provided. Maybe that data then enables a second attacker to access those systems, or realize there’s some kind of highly prized data that could be available. …in many cases, that initial access is through stolen credentials, essentially credentials that have been stolen by one cybercriminal and then sold online to facilitate crime from others.Īnd on that same topic, things that just take simple screenshots, and take a screenshot every few minutes or every hour… again, lots of very sensitive data can be stolen. It’s funny, because I remember, a few years ago, doing a demo on what was at that time was some notorious piece of malware.Īctually, we then got into conversation about simplistic keylogging trojans, and how that type of malware is one of those insidious kind of threats that you can have in your network.Īnd if you think of the type of data that you type, and if someone’s harvesting that data on a continual basis… it’s very easy to see how you can lose credentials, lots of sensitive IP data.Īnd lots of threats today, and lots of ransomware attacks, they get onto a network at some point, and from there, they co-ordinate the rest of the attack… It can be very hard to tell after the fact, can’t it? They’ve almost certainly created new accounts so they can get back in later they’ve probably stolen all your trophy data they’ve almost certainly wiped out all the backups they can, in case you think you can recover without paying.Īnd who knows how many keystrokes they’ve logged and how many passwords they’ve captured during that time? The crooks that unleashed that ransomware attack, and finally lit the blue touch paper in July – they may have been in your network since April, March… Malware-as-a-service “Fully UnDetectable” operators busted
![how can i get infected by kaseya agent how can i get infected by kaseya agent](https://securitynews.sonicwall.com/wp-content/uploads/2021/07/diagram.jpg)
The core malware creators, the crooks at the core – if you look at the ransomware gangs – write the malware, and then they recruit a whole load of affiliates to go out and do the dirty work with it. They’re working in an environment where there’s an affiliate network, if you like. Particularly when the crooks are often not delivering those malware samples by themselves, are they? I think nowadays I’ve stopped counting, there’s just too much. …and things then were in the tens, if not hundreds of thousands. I mean, I can’t even imagine… I think even 10 or 15 years ago, we still counted things…įH. And colleagues said, “Wow, you’re really busy at the moment, but what do you think you’ll do when this fad burns out?”Īnd I’m still wondering what the answer is to that question, because it really has turned into a never-ending story, hasn’t it, Fraser? It was a year when I think we were only in March and we’d already had 28 viruses.
![how can i get infected by kaseya agent how can i get infected by kaseya agent](https://therecord.media/wp-content/uploads/2021/07/Kaseya-logo-1280x720.jpg)
Why we chose that topic – that was actually me remembering… this is going back to the late Eighties or the early Nineties. Today’s topic, as you can see, is the intriguing sounding: “Malware – the never-ending story.” I’m Paul Ducklin, and today my guest is Fraser Howard, whom I always like to describe as “The Malware Specialist in Everything.” Hello, everybody – welcome to the Security SOS 2021 webinar series.