.

An Unfamiliar Enemy

There is nothing that a contemporary day human being likes more than some progression. Our interest in aiming for that further piece of development has proved to be instrumental in achieving the rate of growth that we did. Furthermore, if we expand on that a little more, we’d realize that not only it has stoked our growth, but also we now have a whole host of innovative ways that we can use to accomplish things that once seemed out of our league. What’s more amazing is the radius of this progression. It has impacted our lives in so many different ways that one can conveniently lose track. Nevertheless, there seems to be a shift in the tide. People are being forced to realize that the progression is a tricky thing. If used in a slightly different context, it can become a threat as well. This realization was brought to the fore by the onslaught of cyberattacks on US this year. With people relying heavily on digital space to carry out even the most basic of tasks due to Covid 19, threat actors’ community is aggressively taking advantage of it. So far, we have seen a serious spike in ransomware and other similar type of attacks across the major sectors, leaving the country deeply wounded. In response, the companies and US government have taken measures to reinforce cybersecurity, but as it looks like, the hackers once again have an upper hand.

To evade the newly imposed security regulations, the hackers have come up with new programming languages that the scanners are not familiar with. As per the reports published by Blackberry research, close links have been observed between some malware attacks and 4 programming languages. Even though it’s believed that there are many more, the report indicates that 4 languages, Go, Rust, Nim, and DLang, are the ones at the most advanced stage. Already a few steps behind, the researchers are quickly shifting their focus to observe more loaders and droppers that are written in uncommon languages. Other security measures are also being talked about.

The response to this new threat from hackers can include employment of dynamic and behavioral signatures that tag suspicious activities via sandbox output, endpoint detection, EDR, or log data. However, it’s going to take some time before security agencies are able to catch up with this ingenious piece of maneuver from cybercriminals.

Previous article
Next article

Hot Topics

Related Articles