Women In Security Magazine Issue 11

Page 112

MEGHAN JACQUOT

REFLECTIONS ON MALWARE by Meghan Jacquot, Security Engineer at Inspectiv Malicious software (malware) did not always exist.

on endpoints the file names shifted and so the

Researchers disagree on what represented the first

distribution chain was broken.

virus. I will define it as Wabbit in 1974, because it caused computers to crash. Over time, malware

This was an error that needed to be fixed, and that is

changed the software scene dramatically. At first

exactly what the threat actor group did. Its members

malware was often sent as a joke: think of a snake

either learned about the error through monitoring

game. However, it has become much more serious

their systems or through monitoring defenders’ social

and is now a standard tool of criminal syndicates and

media posts, and modified Emotet rapidly. The error

threat actor groups. This article will discuss three

was found on a Friday, tested, fully debugged and

trends in modern malware seen in 2022.

fixed by the following Monday. Think back to the question about how long it would take your team to

ADAPTABILITY

fix an issue. As defenders we need to be aware of

If you noticed an issue on a Friday afternoon that

how adaptable threat actors are.

impaired the functionality of a system how long would it take to get it fixed? I am certain many of

DECEPTION

you are thinking “It depends” and are considering

A continuing trend observed in malware operations

criticality, uptime, services, who it impacts, etc.

is deception. Deceptive tactics often exploit current

For many teams, a Friday afternoon issue would be

events and this was the case in 2022. For example, in

fixed in the following week, or later depending on

January the final phase of the Windows 11 upgrade

its criticality.

was announced and was exploited as a current-eventbased deception by threat actors. They were able

112

Threat actors are sometimes much more responsive

to create various deceptions masquerading as this

to the issues they face. Emotet, long-lived malware,

necessary download to install their own malicious

was developed by a threat actor group that has

payloads. The group behind infostealer malware,

shown adaptability over the years, including in 2022.

RedLine Stealer, was observed using this exact tactic.

Research group Cryptolaemus identified an update

Another form of deception that researcher iamdeadlyz

to a static file reference in Emotet that compromised

identified in August was more complex. Threat actors

its performance. When the malware was installed

pretended to be testers for a play-to-earn (P2E)

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2022


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Gabrielle Raymundo

5min
pages 128-129

Haicheur Ichrak Amani

3min
pages 130-133

Jack K

2min
page 127

Kao Hansell

7min
pages 124-126

Oorja Rungta

6min
pages 122-123

Out of the shadows: how cybersecurity has taken centre stage in the Australian business arena

3min
pages 118-121

Key themes from 2022 taking us forward

4min
pages 116-117

neural networks and cybersecurity

2min
pages 114-115

Reflections on malware

4min
pages 112-113

Sharing our inner voice stories

7min
pages 108-111

behind cryptocurrency

3min
pages 106-107

Improving security together

3min
pages 102-105

Meeting the security and privacy challenges of the metaverse

1min
page 101

How is the industry responding to the skills and talent squeeze?

4min
pages 98-100

Looking back to move forward: thirty years of experience guiding the way

2min
pages 92-93

Corporate layoffs: a perfect storm for insider risk and the imperative for holistic mitigation approaches

7min
pages 88-91

Cyber resilience in the cyber world

4min
pages 85-87

2022 has been a watershed year for cybersecurity, but what’s next?

5min
pages 82-84

not fill you with dread

4min
pages 80-81

The future of developer security maturity is bright, and these verticals are leading the charge

4min
pages 78-79

Australia’s cybersecurity sector: where are the women?

5min
pages 74-77

you need to reach your vision

12min
pages 54-59

Keep calm and carry on

10min
pages 68-73

Women in cyber security from a recruiters perspective

4min
pages 52-53

Changing the ‘change’ journey

4min
pages 50-51

to cybersecurity

4min
pages 48-49

A real hard look

3min
pages 46-47

Scarlett McDermott

4min
pages 34-35

Jessica Williams

4min
pages 32-33

Cybercrime in 2022

1min
pages 14-15

Emily Goodman

3min
pages 30-31

Dina Atwell

4min
pages 24-27

Joyce Tiwari

2min
pages 18-19

Tara Murphy

2min
pages 28-29

Ranjeeta Rani

2min
pages 20-21

Annelies Moens

3min
pages 16-17

Sandy Assaf

3min
pages 22-23
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.