Malware begets malware
Hear how the rise of Cobalt Strike has been used by hackers as part of their access and lateral movement
Call a Specialist Today! 888-785-4405 | Free Shipping!
As we move into 2022, ransomware shows no signs of slowing down – that's no surprise. What we have seen in the past 18 months, however, is a shift in tactics: targets have shifted to ever-larger organizations, and the business model that dictates how ransomware attacks occur has evolved. It's up to IT professionals to proactively deal with these trends to meet the challenges just on the horizon and beyond.
The most significant change Sophos has observed is a shift from bad actors who make their own bespoke ransomware and carry out their own attacks to a model in which one group builds the ransomware and then leases it out to breaking-and-entering, hands-on-keyboard experts. This has changed the threat landscape in many ways.
In this report you'll find:
Hear how the rise of Cobalt Strike has been used by hackers as part of their access and lateral movement
Find out how malware families have switched their business model to deliver malware payloads more effectively.
See how where once attacks could be broken down into two distinct categories, a new hybrid model of broad and targeted attack has emerged.
Learn about what has changed in AI and machine learning in cybersecurity and how it is used to predict and prevent cyber threats.
Find out the latest on how malware targets mobile devices and how protecting those devices has become essential.
Discover how adversaries are pressurizing individuals to pay up.
Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 500,000 organizations and millions of consumers in more than 150 countries from today's most advanced cyberthreats. Powered by threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos delivers a broad portfolio of advanced products and services to secure users, networks and endpoints against ransomware, malware, exploits, phishing and the wide range of other cyberattacks.