Now everyone is aware of cyber attacks, companies are developing their own defense techniques. But hackers are also improving themselves.. Recently, a new hacking technique called “file-less cyber attacks” has become widespread among hackers.
This “fileless cyber attacks” system technique is more effective against antivirus software than other file attack types. not caught. They access networks with this type of attack programming method.. By infiltrating the source codes of weak software by the hacker, they can also insert their own code and infiltrate the system. For example, the hacker can control operating system tools such as Windows Management Instruments or PowerShell.
The biggest example of this type of attack is the “Wanna Cry” in early 2017. There have been cyber attacks named ”. Many corporate companies have lost millions of dollars from this attack.
What is Wanna Cry Virus?
This virus not only infects computers using Windows operating system, but also makes your computer unusable by taking advantage of vulnerabilities in Windows. and takes full control. It also asks users to pay (ransom) in Bitcoin, which is accepted as the currency, to regain their computers.. Moreover, even formatting does not work after WanaCryptor 2.0 virus infects your computer. This virus has been blocked by someone in the UK. The blocker stated that it was purely by chance.
Fileless cyber attacks have increased in recent months.. These attacks are very dangerous.. Because hackers know the working principles of existing antiviruses, they have developed their attacks to bypass them.. Therefore, antivirus software cannot understand these attacks.. These attacks are labeled as “silent risk.”
PROTECTION AGAINST THE THREAT
If companies want to withstand new attacks, they must prevent malware invasions and the increase in fileless attacks. They should have planned policies to manage. Do not continue with the old methods.. They should inform all their employees about the use of computers and check the security systems of the computers they use.
Companies should use high quality end-to-end encryption and two-sided authentication systems.. Individual users at work or at home should also regularly update their computers’ systems.. The best and updated antivirus software should be used.. Weak antivirus software should be avoided.
Especially remote access permissions on computers should be reviewed.. The level of permissions should be kept high. In our country, users generally keep the security level low, considering that it makes it difficult to use.
The system should be kept up-to-date with regular data backups and security controls.
New Statement from WhatsApp to Turkey (Delayed February 8th)