BACKGROUND:

Researchers at Nordlocker have reported on Nameless malware that stole 1.2 TB of private data, discussing their case study of a 1.2-terabyte database collected from “over 3 million Windows-based computers” between 2018 and 2020 by a “Trojan-type malware.” Their analysis offers details on the malware used, data & file types and programs/ apps targeted, including:

  • Downloaded software included illegal Adobe Photoshop 2018, a Windows cracking tool, and several cracked games
  • Infected 3.25 million Windows based computers
  • 26 million login credentials stolen between 2018 and 2020
  • Screenshots & camera images collected

Experts Comments

June 10, 2021
Rajiv Pimplaskar
Vice President
Veridium

The abrupt shift to remote work due to COVID-19 during the past year also coincidentally corresponds to a 72% increase in ransomware attacks during the same time period. This suggests that several home computers in use for work-from-home purposes, may in fact have already been infected by malware for quite some time but are now being increasingly triggered by bad actors as they carry interesting corporate data traffic. The Nordlocker report highlights how keyloggers and other disciplined

.....Read More

The abrupt shift to remote work due to COVID-19 during the past year also coincidentally corresponds to a 72% increase in ransomware attacks during the same time period. This suggests that several home computers in use for work-from-home purposes, may in fact have already been infected by malware for quite some time but are now being increasingly triggered by bad actors as they carry interesting corporate data traffic. The Nordlocker report highlights how keyloggers and other disciplined malware attacks can be conducted across a large surface area over an extended period of time. These can successfully harvest copious amounts of sensitive data including credential and biographic information which can then be sold on the black market. This data can also be misused for social engineering and lateral movement to facilitate secondary attacks on progressively higher-value targets such as financial accounts. These secondary attacks can take on many forms including a multi-modal fraud campaign encompassing online, mobile, and contact center channels even including branch fraud, with varying degrees of success. 

 

Unfortunately, the weakest link in the security landscape is still the password! Organizations and users need to accelerate their journey to passwordless authentication methods such as phone as a token and or FIDO2 security keys. These authenticators create an unphishable relationship with the user and eliminate the need for password-based credentials thereby improving the organization’s resilience against such cyber attacks.

  Read Less

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.