1. News Malware Alerts (Fake Coronavirus Mails)
Currently, hackers are taking advantage of news stories & global events to target individuals with phishing attacks & spread malware. For instance: Cybercriminals are sending emails that claim to be sent out by the official WHO and give tips to the users to stay protected from the endemic Coronavirus.
Users who trust these emails fall prey to these tactics. Therefore, if you receive any emails in the name of WHO, a vaccine for coronavirus, or any tips that will help cure COVID-19, then never trust such emails. They are sent to inject Emotet malware into your device.
2. Clop Ransomware
Belonging to a popular Cryptomix Ransomware family, Clop is improving with time and causing major damages than ever before. There are tons of variants of Clop and their main goal is to encrypt all files in an enterprise and request huge ransom amounts to decrypt the infected files. Clop Ransomware mostly targets Windows users.
For instance: A dangerous file-encrypting virus that holds the potential to actively prevent the security of the system encrypting the saved files by planting the .CLOP extension file. When this enters into your computer, it exploits AES Cipher to encrypt your data. For example: picture.jpg is renamed to picture.jpg.clop.
3. Social Engineering & Cryptocurrency
Attacks that use social engineering tactics are designed to especially target human aspects. For instance: A new Android banking trojan dubbed Gustuff is gaining popularity. The malicious computer virus targets cryptocurrency apps, known banks like Bank of America, Bank of Scotland, etc.
Not only this, but Sim swapping attacks are also skyrocketing this 2021. Due to clever social engineering, bad actors gain access to the SIM card of the victim and trick the mobile carrier to think it is the real customer that is using the device. Once hackers gain access, they use the victim’s social media accounts & cryptocurrency wallets for their good.
4. Artificial Intelligence the New Beneficiary for Hackers
With the increase in the number of AI devices, hackers are also being inclined towards it. They are using it to develop the latest computer viruses and inject them into the victim’s computer without their notice. For instance: The malicious computer virus is smart enough to figure out its way to target your devices. AI-enabled attacks have the potential to bypass almost all kinds of authentication methods and remain undetected.
With time hackers are becoming technologically advanced, therefore to stay protected from a virus you need to maintain good digital hygiene. And organizations should start operating with AI-enabled defenses to counter AI-enabled attacks.
5. IoT Malware Attacks
In recent years, IoT has gained popularity for its ease of use but at the same time, for its lack of built-in firewalls, it is surrounded by controversies. Most IoT devices fail to provide options to change the default username, thereby making devices an easy target for hackers. For instance: Lately, over 75% of healthcare entities are impacted by a host of TCP/IP vulnerabilities and associated threats against IT, OT, IoT & IoMT devices. A successful execution led to remote code execution, allowing bad actors to take complete access to devices.
Due to this 217.5% increase has been noticed in attacks targeting IoT devices. Therefore, if you have any plans to invest in an IoT device we suggest looking for safety measures. Almost common security threats for IoT devices involve hijacking, leaks, home intrusions, etc.
6. CDPwn (Added in February 2021)
Security Threats for Tens of Millions of Network Devices
Don’t Ignore this, five high-rated Cisco vulnerabilities labeled as CDPwn. When exploited by the attacker these four remote codes and one denial service will allow threat actors to take full control over all the Cisco devices.
For instance: These vulnerabilities are named as CVE-2020-3119 is a stack overflow vulnerability, CVE-2020-3118 is a format string vulnerability, CVE-2020-3111 is a stack overflow vulnerability in the parsing function, CVE-2020-3110 is a heap overflow vulnerability in the Cisco 8000 8000 series IP camera, and CVE-2020-3120 the denial-of-service vulnerability.
7. Zeus Gameover
Gameover is the latest computer virus in the Zeus Family. The malicious threat targets your device in a way to effortlessly access your bank account details and steals all your money.
For instance: Zeus Gameover is one of the deadliest computer viruses that certainly does not need a centralized ‘Command & Control’ server to inject malicious content, gain access, or transfer funds, similar to other common security threats. It simply creates its standalone server and accesses sensitive and confidential details of victims.
With a significant increase in the value of cryptocurrencies over the past couple of years, it won’t be completely wrong to say that 2021 is on the path to be the year of crypto-jacking. Since the emerging security threat mostly remains chronically unreported, it’s cumbersome to exactly tell what are the targeting measures used for exploiting the victim’s device.
For instance: Cryptojacking software is planted in the user’s device to perform data exfiltration, credit card skimming, keylogging, and more.
9. Rise of Cyborg Ransomware
PC Cyborg, also known as (AIDS) Aids Info Disk Trojan, is the first-ever ransomware introduced through a floppy disk. This is why it is called AIDS. This trojan horse virus replaces AUTOEXEC.BAT used to count the number of times a computer is booted. documented. In 2020, a variant of this ransomware known as Cyborg was found in a fake Windows 10 November update.