Emotet banking Trojan attack in 2022 | Cyber Security | VARINDIA News Hour

Published on: Jun 28, 2023
29 views

Emotet banking Trojan attack in 2022 | Cyber Security | VARINDIA News Hour

The actor behind Emotet is a hacker group known as Mealybug. Since starting in 2014 with the first and simplest version of the Trojan, they have turned their operation into a successful crimeware rink that provides Malware-as-a-Service (MaaS). The group achieved this by creating a botnet of infected computers on Emotet malware infrastructure, which they then sold access to. The botnet runs from three clusters of servers known as Epoch 1, Epoch 2, and Epoch 3. They rented this framework to various ransomware ventures, including the infamous Ryuk gang. The distribution mechanism of Emotet is through malspam. Emotet ransacks your contacts list and sends itself to your friends, family, coworkers and clients. Since these emails are coming from your hijacked email account, the emails look less like spam and the recipients, feeling safe, are more inclined to click bad URLs and download infected files. If a connected network is present, Emotet spreads using a list of common passwords, guessing its way onto other connected systems in a brute-force ­attack. If the password to the all-important human resources server is simply “password” then it’s likely Emotet will find its way there.

Emotet continues to be among the most costly and destructive malware affecting SLTT governments. Its worm-like features result in rapidly spreading network-wide infection, which are difficult to combat. Emotet infections have cost SLTT governments up to $1 million per incident to remediate. Emotet malware infiltrates computers through a network spreader component which consists of several spreader modules. The infrastructure that was used by EMOTET involved several hundreds of servers located across the world, all of these having different functionalities in order to manage the computers of the infected victims, to spread to new ones, to serve other criminal groups, and to ultimately make the network mor

#NirmalaSitharaman  #russia  #cybercrime  #ukraine  #malware  #maas  #SonyPictures  #Varindia  #digitaltechnology  #PLIscheme  #BharatPe  #varindianewshour  #Trojanattackin2022  #Trojanattack  #Emotetmalwareinfrastructure  #ransomwareventures  #Unionministerforfinance  #1Password  #DeepakJagdishramGupta  #SonyPicturesEntertainment  


Category:

Technology

<iframe src="https://veblr.com/embed/301593997837cf/emotet-banking-trojan-attack-in-2022-cyber-security-varind?autoplay=true&autoplaynext=true" class="strobemediaplayback-video-player" type="text/html" width="640" height="384" scrolling="no" frameborder="0" allowfullscreen></iframe>
  • Up next

    Safety of CBDC from vulnerability and cyber attacks | CBDC explained | VARINDIA News Hour

    Safety of CBDC from vulnerability and cyber attacks | VARINDIA explained | VARINDIA News Hour

    #CBDC is a digital form of central bank money that can be accessible to the general public; essentially, it consists of individuals and firms having access to transaction and savings accounts with their home country’s central bank. The Government of India has proposed to issue CBDC, ‘Digital Rupee’ during the FY2022-23 which would be a digital avatar of India’s Fiat Currency, controlled and monitored by the Reserve Bank of India (RBI). CBDC will be a legal tender, being a revamped version of the physical currency, which will eventually reduce cost of currency management. CBDC could help policy-makers achieve goals around payment efficiency, financial inclusion, banking and payment competitiveness, access to safe central bank money in the era of digital payments, and more. People can convert digital currency to physical currency and vice-versa with ease. As per RBI, the digital rupee blockchain being developed by the RBI would be able to trace all transactions, unlike the current system of mobile wallets offered by private companies. The units issued in the digital rupee would be included in the currency in circulation, it added. The RBI's digital currency is likely to debut by early 2023. Currently, the bitcoin blockchain supports up to seven transactions per second and then there are some others that let a few thousand transactions per second. However, security aspects involved in constructing and deploying a central bank digital currency (CBDC).

    It is a matter of great concern on the Security part, which is an essential element in the CBDC system. In addition to securing the underlying storage and transfer of value, security involves

    aspects of privacy and resilience. Threats must be mitigated to protect the integrity of funds and the confidentiality of users. A secure CBDC system will retain public trust in the central bank. Under an ac

    By VARINDIA | 44 views

  • Data Breaching | Cyber Insurance Opportunities | VARINDIA News Hour

    Data Breaching | Cyber Insurance Opportunities | VARINDIA News Hour

    We live in a world that’s becoming more digitally dependent. Right from our social interactions to professional interchanges and financial transactions, most take place digitally. While digital resources are enabling, they also leave us vulnerable to cyber criminals as a lot of information regarding our personal and professional lives rests in the digital domain. Cyber insurance or cyber security insurance provides coverage from activities such as identity theft, unauthorized transactions, and more with rapidly increasing digitalisation, cyber risks and loss scenarios keep changing quickly. For all risk owners this makes it even more important to learn from past incidents and identify upcoming cybersecurity trends, threats and vulnerabilities. Cyber insurers have already proven that they can be part of the solution when it comes to building up resiliency and preparedness across all industries. The total global economic damage of cybercrime is a controversial issue. Cybersecurity Ventures estimates global economic cybercrime costs to grow by 15% per year over the next five years, reaching $10.5 trillion annually by 2025. In 2021, the number is expected to be $6 trillion up from $3 trillion in 2015. This is no surprise as the cybercriminal world is advancing at a fast pace.

    Having cyber insurance is a good idea if the costs make sense — it could be the difference between going out of business and staying afloat. Even if you can afford and qualify for coverage, you should know that cybercriminals like to attack companies with cyber insurance. According to a recent survey, these organizations are over two times more likely to pay ransoms than those without it. Hackers even find out the value of potential victims' coverage by breaking into the insurance companies first so they can demand the highest possible ransom. Once they've extorted organizations with cyber insurance, the

    By VARINDIA | 22 views

  • India End-User Spending on Security and Risk Management | 9.4% Growth in 2022 | VARINDIA News Hour

    India End-User Spending on Security and Risk Management | 9.4% Growth in 2022 | VARINDIA News Hour

    Work-From-Anywhere Culture, Hybrid and Virtual-First Workplaces is going to Drive Spending on Cloud Security and Integrated Risk Management, with this the End-user spending on security and risk management in India is forecast to total $2.6 billion in 2022, an increase of 9.4% from 2021, as per Gartner. Hybrid or remote working is the new normal in 2022. Some organizations have even shifted to a virtual-first approach following the learnings from 2020. This model of working puts the spotlight on cloud, endpoint and identity security as employees become the ‘branch of one’ for an organization. Gartner research shows that there is a significant shortage of skilled cybersecurity professionals. Therefore, end-user organizations in India often engage with security service providers to meet their cybersecurity objectives. As a result, spending on security services is forecast to total $1 billion in 2022, the highest among all segments. This will be followed by spending on network security equipment and infrastructure protection.

    COVID-19 was a pivotal moment in the way organizations approached risk or prepared for disruptions. Now, security leaders are putting risk management at the center of their security and business strategies. Cybersecurity will continue to be top priority for Indian CIOs in 2022 and out of the total CIOs in India surveyed, 64% said they will increase their spending on technologies related to cyber and information security in 2022, higher than the global average of 57%. Indian leaders responsible for security and risk management need to adopt an assumed breach mindset because security incidents are inevitable in the current era,” said Gartner. They should prioritize spending on building detection and response capabilities, and not just technologies. This will help them reduce time to detect and time to recover from incidents. In 2022, I

    By VARINDIA | 47 views

  • Ms. S Mohini Ratna, Editor, VARINDIA at 6th Cyber & Data Security Summit 2022

    Ms. S Mohini Ratna, Editor, VARINDIA at 6th Cyber & Data Security Summit 2022

    #CDS2022

    Ms. S Mohini Ratna, Editor, VARINDIA at 6th Cyber & Data Security Summit 2022

    By VARINDIA | 21 views

  • 'Cyber Shiksha for Cyber Suraksha' Street play program, held by cyber crime to create an awareness

    'Cyber Shiksha for Cyber Suraksha' Street play program, held by cyber crime to create an awareness at Mapusa bus stand

    #Goa #GoaNews #streetplay #Cyber #crime #awareness #Mapusa

    'Cyber Shiksha for Cyber Suraksha' Street play program, held by cyber crime to create an awareness

    By ingoanews | 32 views

  • Prof. Triveni Singh, S.P- Cyber Crime- U.P. Police at 6th Cyber & Data Security Summit 2022

    Prof. Triveni Singh, S.P- Cyber Crime- U.P. Police at 6th Cyber & Data Security Summit 2022

    #CDS2022

    Prof. Triveni Singh, S.P- Cyber Crime- U.P. Police at 6th Cyber & Data Security Summit 2022

    By VARINDIA | 28 views

  • Fraudsters Exploiting Blockchain Security | Tracking Assets | VARINDIA News Hour

    Fraudsters Exploiting Blockchain Security | Tracking Assets | VARINDIA News Hour

    Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network which has gained popularity in recent years. It offers a unique structure for data accompanied by in-built security qualities. Blockchain relies on the principles of consensus, decentralization, and cryptography for ensuing trust in transactions. However, blockchain security issues have continued to trouble many organizations and early adopters. Apart from its initial application in cryptocurrency, it is now being used in healthcare, real estate, smart contacts, and other fields. The technology has been a great example of how security tenets in financial transactions and information transmission are transformed. It provides a one-of-a-kind data structure as well as built-in security features. Blockchain is based on the ideas of consensus, decentralization, and cryptography to ensure transaction trust. However, many blockchain security issues have arisen due to faulty technology implementation. A blockchain network can track orders, payments, accounts, production and much more. Because of the members sharing a single view of the truth, you can see all details of a transaction end to end, giving you greater confidence, as well as new efficiencies and opportunities.

    Blockchain technology basically involves the storage of different bits of digital information, known as blocks, in a public database. The blocks of information have cryptographically secure links between them. Blockchain has become popular largely because of the limitation on ‘double spending.’ Blockchain does not allow the use of the same currency on two different transactions. All descriptions of blockchain technology point out towards cryptography, immutability, and decentralization. With cryptographic security and the assurance that no one can modify data without the kno

    By VARINDIA | 21 views

  • Zero Trust Security is Enabling the future to be ready with the growing threats | VARINDIA News Hour

    Zero Trust Security is Enabling the future to be ready with the growing threats | VARINDIA News Hour

    Tech is the most important enabler of remote work, but it hasn’t been without issues. Respondents from a survey were hopeful that IT would prioritize new hardware in 2022 (26%) along with modernizing the service desk to improve IT service levels (26%). Among IT professionals, the desire for modernizing the service desk rises to 32%. While the remote working environment has mitigated random walk-up IT requests from users, it has also challenged organizations that don’t have streamlined request/fulfilment processes and wide access to knowledge and other resources for self-service. Hundreds of thousands of employees will be returning to the offices globally as COVID restrictions are lifted and millions of new positions have been created and filled since February 2020, meaning that IT Departments will be inundated with thousands of new devices coming onto their networks for the first time. Many employees will have onboarded remotely, others will have allowed family members to use their devices, and more will have undoubtedly accessed vulnerable public networks. As a result, the risk of overprivileged devices accessing corporate resources will be huge in the coming weeks. If phones and laptops are brought into the office without a thorough security check, any malware on them could erupt into the entire network. It may also be the first time that many organizations have had the chance to properly manage and audit devices of those who have left employment during the past year.

    Additionally, with best-in-class contextual automation and cybersecurity technologies, enterprises can proactively and predictably detect issues, and then self-heal and self-secure devices. A zero trust security framework clearly offers the most efficient and cost-effective way to secure the Everywhere Workplace. At its simplest, zero trust security enables organizations to continual

    By VARINDIA | 72 views

  • Emotet malware targeting #GoogleChrome for stealing credit card details #shorts



    Emotet malware targeting #GoogleChrome for stealing credit card details #shorts

    By VARINDIA | 20 views

VARINDIA's

  • AI is used Towards Client AI Processing

    #Artificialintelligence is increasingly being used for client AI processing. This means that AI models are being trained and deployed on client devices, such as smartphones, laptops, and IoT devices. This has a number of advantages, including, Reduced latency, Improved privacy and Reduced bandwidth usage.


    Traditionally, AI processing has been conducted by massive clusters of servers in the cloud or data centers. This is because AI models can be very large and complex, and they require a lot of computing power to train and run.

    AI is used Towards Client AI Processing

    By VARINDIA | 385 views

  • Can Google’s tools combat online misinformation

    #Google's efforts to combat misinformation are important because misinformation can have a negative impact on society. It can undermine trust in institutions, lead to violence, and harm democracy. By developing new tools and initiatives, Google is helping to make the internet a safer and more informed place for everyone.

    Google has recently unveiled three new tools to combat online misinformation:

    · About this Image: This feature, which was initially unveiled earlier in 2023 and is now available globally to English-speaking users through Google Search, provides information about images, including their history, descriptions by users, metadata, and clear indications if an image is generated by AI. Google's AI-generated images are also clearly labelled.

    · Fact Check Explorer: This tool allows journalists to verify images by tapping into information from independent organizations.

    · AI-generated source descriptions within the Search Generative Experience: This feature provides original sources and insights from reputable publications, which are accessible through the "More About This Page" section in search results.

    Can Google’s tools combat online misinformation

    By VARINDIA | 181 views

  • Increasing online Frauds

    Recent developments in the technology landscape, including the acceleration of automation, artificial intelligence, and the digitization of industries, are transforming the nature of work. These challenges have immediate and far-reaching implications for India's economy, society, and future prospects.


    The Tech Tsunami, characterized by rapid technological advancements, has the potential to drive unprecedented growth and innovation. However, if not harnessed effectively, it could lead to job shrinkage, job displacement and job reduction further leading to increased economic inequality.

    Today's Headline in NewsHours
    0:00 Intro
    3:07 Online gaming firms sent tax notices worth INR 1 lakh cr
    3:36 Government plans to introduce regulatory sandbox for OTT apps
    4:05 #Microsoft pulling the plug on its metaverse project
    4:33 #HMD Global to manufacture own brand of smartphones in India in 2024
    5:00 #TechMahindra’s CEO designate Mohit Joshi announces restructuring


    Follow Us On :-

    Website:https://varindia.com/

    https://www.facebook.com/VARINDIAMagazine/

    https://twitter.com/varindiamag

    https://www.instagram.com/varindia/

    https://www.linkedin.com/company/14636899/admin/

    https://in.pinterest.com/varindia/

    https://varindia.tumblr.com/

    Visit on https://varindia.com/ to know more

    Labels & Copyrights :- VARINDIA

    Increasing online Frauds

    By VARINDIA | 186 views

Govt./PSU

Daily Mirror