👉State Of Malware Infogaphic & 👉2017 predictions

👉👉👉👉👉👉Follow WP HACKED HELP on Twitter & facebook.

2017 predictions


It is possible that, with the major ransomware players taking the main stage at the end of the year, we are unlikely to see many, if any, new advanced ransomware families enter the market with the sophistication and mass penetration of Cerber and Locky.

Many of them will be quickly developed just to take advantage of ransomware’s popularity amongst cybercriminals.This is a continuation of a trend started in 2016.

Nearly 60 percent of the ransomware variants detected in the last six months of 2016 were less than one year old, further driving home the fact that most ransomware in existence today is developed by newcomers to the ransomware industry. We may see more variants that modify the infected computer’s Master Boot Record (MBR), which is a key part of a system’s ability to boot into its operating system.

Once modified, the system will boot into a lock screen set up by the malware, demanding payment not only to decrypt files but also to restore access to the main operating system. The addition of this functionality 
reduces the options for a victim to two: either pay the ransom or have the system wiped completely

🔥🔥🔥Malware distribution

Over the years, we have observed only one stable truth of malware development: distribution through email. Phishing attacks, including malicious attachments, had a big comeback in the second half of the year.

However, we predict that exploit kits (RIG specifically) are likely to become the standard for malware distribution again in the very near future. We will not see malicious phishing attacks disappear.

Due to the new developments in the download and installation of malware originating from phishing emails, as well as the use of macro scripts in Microsoft Office documents, this method of attack will continue at steady levels throughout the rest of the year, likely with increased sophistication.

🔥🔥🔥Internet of Things (IoT)

The surge of new cyberattacks leveraging IoT devices, coupled with a lack of concern for security on the part of the IoT industry, has resulted in botnets like Mirai being able to take down the backbone of the Internet. Despite what the IoT industry decides to do — batten down the hatches or ignore security altogether — the doors have been opened by malware like Mirai for new IoT attack strategies in 2017

Whole white paper is also availaible for download here.