Malware

Celebrating Advanced Tech and the Differentiation Paradox at CloudFest 2019

There’s no doubt businesses increasingly view the cloud as an agile, efficient way to manage their IT needs: 58 percent are moving toward a hybrid IT environment and another 18 percent are looking to move completely to the cloud (per 451 Research). This means that managed service providers (MSPs) need the right tools to stay in the game – and ahead of the competition – to facilitate this process for customers and capture some of the projected $186.4 billion cloud computing market.

Next week at CloudFest 2019, Acronis will join 7,000 global cloud, hosting, and service provider industry pros to share IT solutions that enable MSPs to solve pressing, complex customer problems. Here’s a preview of what will be top-of-mind at Acronis’ CloudFest booth #F04.

Surveying the Malware Landscape for 2019

Looking back at 2018, the fight against malware showed glimmers of promise, as new technologies like artificial intelligence (AI) and machine learning (ML) were successfully deployed in some quarters to fight high-priority threats like ransomware.

The outlook for 2019 is less rosy, though, as malicious state actors and cybercriminals prepare for battle with a new array of tools and techniques designed to create mayhem and reap profits at the expense of everyone else.

Buckle up, IT security pros: the following trends indicate the anti-malware ride in 2019 is going to be a bumpy one.

Stopping cryptomining malware

One month after the release of the Acronis True Image 2019 Cyber Protection update, we’ve already gotten some interesting findings and amazing results to share from our update to our Acronis Active Protection defensive technologies. One of the major features added as part of the Cyber Protection update was the ability to detect and stop potential cryptomining malware in Windows systems, safeguarding the machines resources, performance and potential hardware of Acronis True Image users.

While we did not expect to see a lot of detections during the initial rollout, the telemetry data collected so far – surprisingly – shows the opposite.

 

RanSim adds cryptojacking scenarios

We’ve blogged about RanSim before: it’s a nice tool from KnowBe4, a security awareness training company that employs the famous former hacker, Kevin Mitnick. They help people learn about IT security and prepare for various security threats. RanSim originally served as a ransomware simulator – allowing users to see if their systems were protected against ransomware attacks without the risk of the real thing.

Recently, KnowBe4 updated RanSim so that it also emulates cryptojackers – the latest, fast-growing malware threat that targets computers and mobile devices to hijack system resources to secretly mine cryptocurrency – and Acronis' cyber protection technology performed extremely well.

 

Acronis True Image 2019 Cyber Protection

There are few constants in the world. The sun will rise in the east. Rain will fall. Dropped toast will always land buttered-side down. And as quickly as technology advances, the threats to the data we rely on every day evolve as well.

While it is difficult to imagine every potential data loss event, since our founding 15 years ago, Acronis has gotten very good at anticipating and responding to threats so customers are always protected. Every solution Acronis offers is designed with the Five Vectors of Data Protection in mind – ensuring data is Safe, Accessible, Private, Authentic and Secure. We remember it by its acronym: SAPAS.

This week’s update for Acronis True Image 2019 is the latest addition to our SAPAS-defined protection portfolio.

 

Acronis joins AMTSO

Acronis joined the Anti-Malware Testing Standard Organization (AMTSO) earlier this year to ensure its solutions adhere to the highest standards of security and help shape the evaluation criteria of future technologies. Acronis is happy to take part in establishing these protocols and procedures for the next generation of cyber protection and to help improve security testing practices overall within the industry.

One important step towards this collaboration was to approve and adopt AMTSO’s Testing Protocol Standard, a process that demanded years of development, trials, and consultation before final approval. It was finally adopted at the end of May, marking a major step for the industry. Here’s why it matters.

Bad Rabbit Ransomware

On Tuesday, October 24, 2017, a new ransomware sample called Bad Rabbit hit Russia, Ukraine, Turkey, Germany, Bulgaria, USA, and Japan. Russia and Ukraine were hit the most as the infection started through some hacked Russian news websites. Russian media agencies Interfax and Fontanka, as well as transportation organizations in Ukraine including the Odessa airport, Kiev's subway and the country's Ministry of Infrastructure were among the first to catch the infection.

CCleaner Malware

Users of CCleaner for Windows, a maintenance and file clean-up tool developed by Avast Piriform, are being told to update their software immediately, since it’s been discovered that hackers had installed a backdoor in the official application that would allow additional malware to be added to the infected system.

The ability of cybercriminals to access user systems by adding malware into official software builds of trusted vendors is a major red flag. Protecting your data just got even more critical, so here’s what you need to know.

Patya Wiper

Remember that fast-moving cyberattack that slashed its way across the globe in late June? Turns out it wasn’t really ransomware but an even more malicious piece of malware called a “wiper” that left victims with no hope of getting back their data.  

Protect from Industroyer

If you are interested in cybersecurity, you may remember Stuxnet, an infamous worm which stopped uranium enrichment plants in Iran back in 2010. It’s no longer a secret that it was an Israeli-American cyberweapon. Since that time there were a lot of cases where critical infrastructure was attacked without any political motivation. One recent case is Industroyer — a mix of cyber weapon and ransomware-like products. We were contacted by our big OEM partners running process control systems who asked about this threat, wondering if our newest anti-ransomware technology, namely Acronis Active Protection™ could help. And guess what? Acronis Active Protection does help!