Cybersecurity Predictions For 2022 — CodeHunter CEO Larry Roshfeld Featured in Technical.ly

 

January 3, 2022 — CEO Larry Roshfeld shared his cybersecurity prediction for 2022 with Technical.ly — alongside his biggest hope for the sector.

 
CodeHunter | Blog | Cybersecurity Predictions For 2022 — CodeHunter CEO Larry Roshfeld Featured in Technical.ly
 “My biggest hope for the sector in 2022 is that organizations will move to effectively implementing a defense-in-depth cybersecurity strategy,” Roshfeld told Technical.ly. “Organizations will need to recognize and invest in more than detection capabilities at the desktop, and network and firewall that identify attacks in progress. Instead, these companies will become more proactive in handling threats by adopting softwares or strategies that tackle cyber threat issues prior to impact.”
 

Read More: “What will the cybersecurity industry look like in 2022?

Why Executives Should Play Cyber War Games

 Make Sure You’re Prepared For Cyber Attacks

Just as the military uses simulated environments to prepare troops, forward-thinking cybersecurity teams stage mock security breaches to ensure they’re prepared for cyber attacks. Companies like Boeing, Lockheed Martin, and Raytheon Technologies use cyber war games as part of their security arsenal — a proactive measure to safeguard their data and their business.

As your business grows, so will the number of attacks you face. You know the adage: Cyberattacks are so common that it’s not a matter of whether a business will fall prey to one, but when. Here are our top five reasons why you should conduct cyber war games at your company.

1. Stand ready.

Cyber war games ensure your security professionals and extended team are ready for anything. Your proprietary data can be swaddled in encryptions and accessible only by a 2FA token, retina scan, and voice-activated password, but unless your company’s cybersecurity is constantly evolving, it’s only a matter of time before it’s breached. By participating in war games, tech professionals learn to think like an adversary and identify weaknesses in their own defenses before hackers can.

 

2. Learn the ways of your adversaries to defend your environment.

Cyber war games go beyond penetration testing in search of vulnerabilities — unsecured network ports, data in transit, and externally facing programs sharing too much information. Modeled after real-life hacking techniques, from phishing to cross-site scripting, they’re designed to test even the most savvy security team’s agility and decision-making skills. Furthermore, it helps the security team better understand each angle of an attack, anticipate new ones, and rapidly devise go-to countermeasures. NATO’s yearly cyber war game, Locked Shields, imagines a fictional country on the defensive. Targets may include anything from the civilian to the military — think water treatment facilities, energy plants, and military installations— and the rules, based on actual law, force participants to navigate the legal repercussions of their actions. Put into this context, it’s easier to see yourself as the protector of sensitive systems and information.

3. Know the risks of being ill-prepared.

Attacks have consequences. A data breach can cost millions of dollars, lose client trust and business, and lead to legal repercussions. If protected personal information (PPI) is stolen, organizations may face not only government fines but also legal action such as class action lawsuits — not to mention the gauntlet of public ridicule. Social media platforms have certainly taken heat this year: Facebook alone suffered a breach that exposed 533 million users’ information and is now facing potentially billions of dollars in lawsuits — and that’s on top of the PR nightmare.

4. Improve security culture.

If a security team is in the habit of setting and forgetting defensive measures, they’re leaving their company exposed to collapse under cyberattacks. The best defense against ever-evolving attacks is practice, and what better way to practice than to play against one another? As in chess, the player with the stronger and more flexible tactics will emerge the victor — and the entire team will learn from it.

 

5. Develop strategies to survive the next attack.

Many companies will struggle to survive a cyberattack. Part of a cyber war game should include fail safes and backup plans. What happens if the enemy does breach the gates? A war game inspires players to contrive system resets, automatic updates and data backups, and countless other ways to mitigate the potential effects of a cyberattack. Damage control is just as important as defense in surviving an attack.

Practicing how to defend against cyber attacks is an increasingly complex part of company security; wargaming keeps a security team’s minds open, reactions on-point, and strategies creative — and, most importantly, one step ahead.

The Emergence of Killware

 

The Next War May Be Started Remotely — With a Single Click

Movies and television contribute to the popular image of hackers — solitary misfits disrupting business as usual from a poorly lit basement — and for the romantic notion that their actions are often cool, even if criminal.

In reality, cybercrime is anything but romantic — it’s becoming increasingly deadly. Cyber terrorism has grown up since “Hackers” popularized that myth decades ago: Now state sponsored cyber criminals operate in highly organized rings around the world — launching targeted killware that, true to its name, aims to cause physical harm. Cybercrime today is more sci-fi and action thriller than rom-com.

Killware: The Nuclear Bomb of Cyber Warfare

From targeting water and food supplies to transportation and hospitals, organized cybercrime attacks critical infrastructure. Designed to destroy, killware is the nuclear threat of cyber warfare — with increasingly wider-reaching consequences. The next war may be started remotely with a single click.

While killware has been around for decades, it’s growing more targeted — and more deadly. After an attempted hack of a water treatment facility in Florida, U.S. Homeland Security Secretary Alejandro Mayorkas warned the public that killware is increasing in frequency and gravity. Had the attack been successful, the damage to public health and safety could have been astronomical. And the lingering question is, “Was that attack just intended to test current defenses?” 

Weaponized Operational Tech is Deadly

Informational Technology (IT) and Operational Technology (OT) have become increasingly integrated since the widespread adoption of cloud computing — and cyber risk is intermingled as well. Gartner predicts that by 2025 attacks on operational technology (OT) environments will be weaponized with the intent to cause physical harm or even death — costing over $50 billion per year.

OT devices — typically older, expensive, and cumbersome to update — were built without considering the cybersecurity risks of the future, making them an easier target for entry into other systems. And hacking into a single device can take down all of the devices in an OT system.

OT is also connected to IT systems that carry their own cybersecurity risk — in 2017 the WannaCry ransomware attack infected Windows systems. From there, malware infected 70,000 devices throughout National Health Services Hospitals in England and Scotland, disrupting hospital services, communications, stalling ambulances, and putting lives at risk.

How Organizations Can Reduce Risk

From consistently patching and updating legacy systems to applying a comprehensive cybersecurity framework, organizations can begin to protect themselves from killware. Here’s how you can further reduce risk today:

  • Get Patched Up: Mitigate attacks by patching early and often.

  • Update Your Legacy Systems: Legacy systems are chock full of loopholes and vulnerabilities. It’s time to modernize your legacy systems — or even upgrade to a new system.

  • Invest in Anti-Malware Software: Secure all systems with endpoint security software.

  • OT Cybersecurity Staff Training: Monitor your OT systems at each of your facilities. Train and prepare your staff members so they know how to respond in the event of an attack.

  • Maintain a Secure Backup Architecture: In case of attack, you’ll be ready with proper backup.

Insider Threats: The Danger Within Your Own Walls

 

Reassessing Your Cybersecurity Framework From The Inside Out

Remember the days when you could build a secure perimeter around your business and feel safe? With corporate boundaries shifting from the office to remote work locations, company leaders and cybersecurity pros must secure sensitive data, systems, and networks from the inside out.  

Insider Threats: A Costly Mistake

Hollywood encourages the idea that insider threats are often due to malicious actors housed within our own walls. In reality, internal leaks are far less glamorous — and mostly unintentional.

According to a 2021 Cyber Security Trends Report from PurpleSec, 63% of security breaches stem from negligence. This includes sending emails to the wrong address, failing to protect passwords, or falling victim to social engineering. In fact, 98% of all attacks are social engineering — most often phishing attacks that manipulate people into sharing personal information, sensitive data, or credentials that allow access to confidential systems and networks.

 

Insider Attacks: A Rising Concern

While far less common, insider attacks are a rising concern. Malicious internal attacks are often linked to disgruntled employees — or former employees — with access to sensitive data.

On a recent episode of OzCyber Unlocked, two investigators share their experiences of intentional insider attacks. One investigator uncovered the identity of a resentful employee who stole data from his company’s client and held it for ransom in an act of revenge. A separate investigation discovered several illegal hotspots at a financial institution, three of which were found to be suspicious — including one device planted under the floorboards.

A recent BBC article highlights employees secretly taking on secret full-time jobs. These overemployed individuals are typically looking to game the system, increasing their income while asserting a sense of control. It’s easy to imagine this scenario going wrong and a conflicted employee, with access to sensitive data across several companies, becoming an insider threat.

A New Framework: A Holistic Approach to Cybersecurity

You can assume your organization faces some degree of risk — what kind and how much depends both on your cybersecurity framework and the solutions you adopt to secure your data. Consider combining clear policies with the right methods and tools to close security gaps and address insider threats — including the following basic recommendations:

Staff Training

Employees at all levels, especially leadership, must be educated about strong passwords, multi-factor authentication (MFA), and cybersecurity best practices.

Role-Based Access Controls

Access to sensitive data should be limited to those employees who need it to do their current jobs.

Stay Current with Security Patches for Commercial Software

Commercial software should be kept current and tested regularly.  

Evaluating Internally Developed Software

Internally developed applications, especially legacy applications, can provide an even greater opportunity for damage than commercial software. Put in place procedures for assessing potential exposure from custom applications

 

Learn More:

 

For more information on preventing insider attacks, see Microsoft’s “Uncovering Hidden Risks” podcast series.

CodeHunter: Automating Cybersecurity

Tomorrow’s cybersecurity today

 

 

Inexperience is one of cybersecurity’s biggest problems. Globally, 3.5 million cybersecurity jobs remain unfilled due to a lack of available talent and expertise. This shouldn’t come as a surprise, given that even entry-level cybersecurity positions require three or more years of experience.

Luckily, CodeHunter is helping to fix that problem.

CodeHunter Helps Bridge the Cybersecurity Skills Gap 

“The whole idea behind CodeHunter was to take a very complex manual process, simplify it, and automate it,” says CodeHunter CTO Chris O’Ferrell.

Companies can rely on CodeHunter’s automated cyber defense system to continually scan executable files and proactively detect threats.

CodeHunter goes one step further than existing cybersecurity tools that only scan for known malware by exposing malicious behaviors hidden inside otherwise innocent-looking executable files.

By automating this search for suspicious behavior, CodeHunter completes weeks’ worth of manual reverse engineering in mere hours. 

Give Your Cybersecurity Team a Jumpstart on Malware

Automated reverse engineering and code behavior analysis allows even entry-level cybersecurity professionals to quickly expose and analyze potential threats to their organizations’ systems, maintaining rigorous cybersecurity practices.

As CodeHunter CEO Larry Roshfeld says, “CodeHunter gives people the ability to rest easy knowing they’ve proactively protected themselves in the best possible way.”

Learn more about how CodeHunter can help your organization automate its malware detection and analysis process to bridge the cybersecurity skills gap.

 
 

$1,270,000: Why Hospitals Pay Millions to Recover From a Cyberattack | The Real Cost of Recovering From a Ransomware Attack

 

The Real Cost of Recovering From a Ransomware Attack

In a world where escalating ransomware threats make daily headlines, the stakes for hospitals are excruciatingly high. Losing money is one thing — losing a patient is another. A hospital CISO doesn’t have the luxury of negotiating with cybercriminals when patients’ lives are on the line.  

 

Paying the ransom itself comes with a hefty price tag — but remediation costs, including the cost of downtime, lost opportunities, data recovery, lawsuits, and loss of reputation, increase the bill tenfold. And it all adds up to an average of $1,270,000.

Hospitals Are at the Center of the Escalating Cyber Storm 

The pandemic offered a perfect storm for cybercriminals — and hospitals paid the price. Cybercriminals brought in staggering amounts of cash by installing ransomware at overstretched hospitals, notoriously unprepared for escalating cybersecurity threats. Now, cyber gangs like FIN12 intentionally target vulnerabilities in the healthcare sector, looking for an easy payday. The increased risk to patients’ lives incentivizes hospitals to pay up, and cybercriminals know it.

When cybercriminals shut down networks, encrypt data, and threaten to shut down the facility’s utilities, the repercussions are complicated and costly. Precious commodities like patient information and lifesaving equipment are at risk. And when ransomware infiltrates a hospital’s lifesaving systems, there are no clear instructions for recovery. Even hardliner authorities (“We don’t negotiate with terrorists!”) recommend meeting ransom demands to save patients’ lives.

The Hidden Costs of Ransomware Attacks at Hospitals

The ransom paid — an average of $131,000 in the healthcare sector — is just a fraction of the $1,270,000 average recovery cost from a ransomware attack. Operational downtime, negative patient experience, loss of reputation, staff overtime, device costs, and network repairs make up the difference. Even if the attack is swift and the criminals withdraw quickly after paying the ransom, lost revenue adds up. NEO Urology in Ohio lost $30,000 to $50,000 every day for three days after paying a $75,000 ransom.

A worrying 54% of IT teams said that cyberattacks are too advanced to handle on their own. Outside agencies are often brought in to assist with data and device recovery (which can take years). When all is said and done, the bill can cost more than the ransom. It costs up to $2,000 on average to recover data from one hard drive. Consider how many hard drives are in a single hospital and what it would cost to bring them all back up to speed. Okay, you can spare yourself the mental math: It’s a lot. Don’t even try to think about the other, more complex medical devices similarly affected by network attacks — you’ll get a headache.

Payroll and education costs also add up. With networks offline, hospital staff must make handwritten records to maintain protocols, procedures, and schedules. Once systems are back online, those same records must be transcribed into the system to avoid leaving gaps in the facility’s history. These tedious tasks add a surprising amount of time to any healthcare worker’s shift, resulting in overtime and hazard pay. And let’s not forget the resources needed to train staff about cybersecurity best practices to avoid another attack.

$1,270,000 is a hefty price tag, but even so, it fails to include the costs of legal repercussions associated with a successful cyberattack.

Quality Rep Services, Inc. (QRS), a healthcare technology vendor in Knoxville, Tennessee, is facing a class action lawsuit for a data breach of 319,778 records. On the internal side of things, Community Medical Center (CMC) in Missoula, Montana, flirted with employee lawsuit material over payroll discrepancies. CMC suffered a cyberattack in late 2021, which affected payroll processing. In the interim, the medical center duplicated paychecks from December 3, 2021, prompting a letter from the Montana Nurses Association (MNA) urging CMC to pay nurses what they are owed.

Minimize Damage and Keep Your Data Safe

Until cyberattacks let up (which is more likely than seeing the dead rise from the grave but less likely than seeing a good Matrix sequel), these expenses aren’t going down. Remember, the best defense is not preventing attacks (they’re going to happen!), but preventing successful attacks by keeping backups of your important data secured off-network and minimizing the effects on patients. The less damage done, the less recovery is needed.

 
 

Call the Feds! What Bank CISOs Need to Do After a Data Breach

Mitigate Damage: The 4 Critical Steps For a Bank CISO’s Response

 

Financial institutions are one of the most vulnerable targets for cyberattacks — and today’s Bonnies and Clydes are after more than just cash. Social security numbers, credit card accounts, and sensitive financial data are all up for grabs when a bank is breached, creating perfect conditions for costly and time-consuming cyber nightmares — for clients and institutions alike.

Having a playbook in place in the event of a breach can help your financial institution avoid costly fines, reputational damage, and future attacks. Below are four critical steps CISOs in financial institutions need to take after a data breach.

Step 1: Know the Rules

Under the Gramm-Leach-Bliley (GLB) Act, financial institutions are legally required to ensure that their client’s details are safe and confidential: They must have a written plan that outlines how they protect customer data; use service providers with security safeguards in place; train their employees on cyber security best practices; and work with law enforcement in the event of a breach.

Sounds simple enough, but each state has its own set of rules and regulations for working with local and federal law enforcement when sensitive data is compromised. CISOs need to make sure they understand the scope of their responsibilities — as well as their power of authority — and be fluent in local legal requirements when devising their company’s own plan.

Step 2: Contact the Proper Authorities

It might seem easier to quietly pay off cybercriminals rather than deal with an embarrassing public fallout and sky-high fines. While that may be true, it is a spectacularly bad idea. The best practice is to follow protocol and alert the authorities, immediately.

Not convinced? Let’s entertain the idea of an institution responding to ransomware by quietly slipping Bitcoins to cybercriminals as payment. Bypassing lengthy investigations and the disruption of daily activities — not to mention neatly sidestepping loss of trust from customers and clients if the attack is exposed — may sound appealing, but the fallout could be worse than the breach itself. There’s no guarantee that the attackers would hold true to their word and relinquish control, or that they wouldn’t abuse the data to which they’d gained access. There is also zero guarantee that the group wouldn’t make their actions known — either by simply announcing it or by broadcasting the very data they stole. Just ask Joe Sullivan, former CISO at Uber, who faced charges from the FBI after taking matters into his own hands and paying a ransom.

Step 3: Own Up and Alert Your Customers

The fear of shouldering the blame for a breach is understandable, especially when 23% of companies report executive firings following cyberattacks. Banks are burdened with safeguarding their customers’ finances and their personal identifiable information, making a breach a particularly nasty pill to swallow. However, a careful and methodical response can help to protect and retrieve clients’ information — and help institutions save face.

In April of 2021, the Bank of Oak Ridge in North Carolina reported a data breach affecting an undisclosed number of accounts. Social Security numbers, bank account numbers, and driver’s license numbers were exposed.

In response, the bank closed all five of its branches for two days while the FBI assisted with the investigation. When they determined who was likely affected, the bank alerted its customers and offered free identity protection. By reporting the incident quickly, following protocol, and communicating with transparency, the bank dodged legal fines — and remained in business.

Never heard of this incident? Exactly.

Step 4: Conduct a Critical Vulnerability Scan

Bad things happen to even the best IT teams, but there’s no excuse for being hacked or attacked in the same way twice. Below are high-level practices all organizations should adopt in the aftermath of — and well before — an attack.

  • Prioritize security from the top down. For security measures to be effective, executive level buy-in is a must. It’s on CISOs and other C-suite execs to make cybersecurity and awareness a core part of organizational culture.

  • Know your risk profile. Clearly identifying your industry’s attack vectors, gaming out different cyberattack scenarios, and being aligned on your organization’s most valuable assets — and how to protect them — is crucial to creating and executing effective cyber security initiatives.

  • Take threats seriously. Prepare for the worst. Seriously. (Read more: Why Executives Should Play Cyber War Games)

  • Enforce your policies. Security policies should be baked into day-to-day operations — and outlined in terms that all employees (not just tech geeks) can understand. Document everything, automate whenever possible, and keep things simple.

  • Back it up. Data loss can be a death blow to an organization — many never fully recover. Keep a copy of critical data in a secure offsite location and regularly test your backups.

  • Keep up with security patches. Sounds like a no-brainer, but regularly applying legitimate security patches to software and hardware systems is often overlooked. Are there examples where a security patch created a vulnerability? A couple. Are there examples where the lack of a patch created a huge problem? A couple thousand.

If a bank wants to mitigate the damages from a cyberattack and maintain its customers’ trust, the CISO should get to know the applicable local and federal laws, create a plan, and communicate any data breaches without fail. An attack is all but inevitable, but how an institution reacts determines whether it will recover and move on, or keep on taking hits even after the ransom is paid.

What Is Malware — and Why You Should Give a Sh*t

 

It’s Time to Face Escalating Malware Threats

 

What Is Malware?

Malware is malicious software designed to infect your devices and networks — sometimes for financial gain and sometimes just for the thrill of causing trouble. It can gain unauthorized access to sensitive data, prevent access to your device and network in exchange for ransom, or sell your passwords to someone else — often on the Dark Web. In summary, its aim is to destroy. 

While malware has been around since the ‘80s, many of today’s threats are firmly future-facing — including extremely advanced, AI-driven malware that can evade detection and hide in code for years. This shouldn’t come as a surprise: technology is constantly evolving, and malware is no exception.  

Malware’s Impact on Daily Life

2021 is being called the year of ransomware. Cyber attacks are more sophisticated, coordinated, and well-funded than ever — and they’re happening all the time. An organization is attacked by ransomware every 11 seconds — with annual damages projected at $20 billion. And that’s just ransomware, only one type of malware out of dozens. The total losses due to cybercrime in general are predicted to approach upwards of $6 trillion annually.

From government and financial institutions to small businesses, schools, and global corporations, organized cyber criminals are now ruthlessly attacking all industries — in addition to critical infrastructure like hospitals and transportation. The result? Cyber attacks are now threatening lives as well as sensitive data. According to the Wall Street Journal, a ransomware attack on a Las Vegas hospital chain “nearly brought Las Vegas hospitals to their knees” — and another at a New York trauma center stopped services and delayed care. To put it bluntly, people died from malware in 2021; it’s not just about loss of productivity and profits anymore — it’s about loss of life.

You don’t have to look far to find evidence of escalating malware threats:

Foreign attacks on the U.S. government were reported during the SolarWinds attack.

  • A zero-day attack in September at Microsoft allowed hackers to gain administrative control on Windows 10, 11, and Windows servers.

  • Ransomware at the Colonial Pipeline Company halted operations, disrupting energy consumers from Texas to New York.

  • Ransomware shut down meat processing plants at JBS, responsible for one-fifth of the nation’s meat supply. 

Know Your Enemy: The Common Types of Malware

To understand growing threats to personal identifiable information (PII) and business operations, it helps know what you’re up against. These are the most common types of malware:

  1. Ransomware Ransomware essentially encrypts and “kidnaps” your files and systems — demanding ransom in exchange for a decryption key.

  2. Viruses Viruses are malicious code designed to replicate and spread between devices when a user host triggers activation, causing damage and oftentimes destroying devices.

  3. Worms Worms are stand-alone malicious programs that can replicate and spread themselves to other devices and computers across a network.

  4. Spyware True to its name, spyware is any malware designed to spy on you and monitor your behaviors to collect PII. Spyware can discover passwords to sensitive accounts, including your financials.

  5. Keyloggers Keyloggers record your keystrokes in order to gain access to your accounts.

  6. Trojan Horse A Trojan Horse is a malicious program that is downloaded onto your computer — often hidden inside an innocuous looking email (hat tip to Virgil). A common way of gaining access to your corporate devices and systems, a Trojan Horse hides by mimicking legitimate programs.

  7. Malvertising Malvertising spreads malware with legitimate online advertising. As if in-stream video ads weren’t awful enough.

  8. Adware Adware is software that automatically generates advertisements on your device without your consent.

  9. Rootkits Rootkits are hidden malicious software and programs that allow administrative access to devices and systems.

How Does Your Device Get Infected With Malware?

From getting phished to downloading apps with malicious code, there are many different ways malware can infect your devices. Most of them are common mistakes people make every single day. In cybersecurity research, it’s called negligence — a fancy way of saying someone screwed up, big time.

According to a 2021 Cyber Security Trends Report from PurpleSec, 98% of all attacks are social engineering — think phishing (a bad guy pretending to be a good guy to get sensitive information from a trusting user) and spam emails. Social engineering manipulates a person to share PII, sensitive data, or offer up credentials that grant administrative access to systems and networks.

Occasionally, malware can infect your devices through vulnerabilities in the operating system or through compromised software. The most risky type of vulnerability is a zero-day threat. During zero-days, a bad actor exploits unknown vulnerabilities in applications, servers, systems, or networks. Other times, devastating attacks occur despite known vulnerabilities and available patches — because people fail to patch and update their applications and systems.

Here are the most common ways your devices get infected with malware:

  1. Social Engineering

  2. Phishing and Malspam Emails

  3. Downloading Apps With Malicious Code

  4. Visiting Non-secure Websites

  5. Malvertisements and Adware

  6. Vulnerabilities in the Operating System

  7. Vulnerabilities in the Network

  8. Compromised Software

I have an antivirus program on my computer, so I’m safe, right?

No. Your car has brakes and seat belts. It doesn’t mean you can’t get in an accident, does it?

How Can You Detect and Remove Malware?

Before you can remove malware, you need to be able to detect it. Sometimes, your device simply stops working — or the malware blatantly pops up on your screen. Most of the time, however, malware is harder to detect. Malware may stay hidden in software for six to seven years before it’s triggered. More advanced malware is designed to hide as it operates, so it can access more information and infect more devices.

If you suspect one of your devices have been infected, get help, fast, from an expert. The longer you wait, the worse it will be. Pretending everything is fine is not going to make anything better.  

To detect malware and remediate the problem, consider the following solutions: 

Advanced Malware Detection: If you’re working with a larger tech stack or want to confirm your files are clean, you’ll need more advanced malware detection solutions like CodeHunter Pro. CodeHunter Pro finds malware and suspicious behaviors in executable files without sandboxes, signatures, or source code — and detects malware that might be hidden or lying dormant. Zero-day attacks and sleeper code can’t hide, even if obfuscated or scattered throughout software code.

Strong Antivirus Programs: A strong antivirus program can detect — and often remove — many types of malware.

Manual Removal: Rogue registry keys, individual files, and malware designed to prevent removal are common — you’ll need to manually remove the malicious software.

Restore a Backup: You can try restoring your data to a known point before malware infected your devices.

CodeHunter Launches New Enterprise Solution

Helping organizations solve tomorrow’s cybersecurity problems today

 
 

The modern cyber threat landscape is terrifying, even for those of us who have lived in this environment for decades —especially for those of us who have lived in it for decades. State actors perpetrate global attacks against other governments. Critical infrastructure, such as hospitals and energy, are among their targets. And the work-from-home trend accelerated by the pandemic has only expanded the potential attack surface for cybercriminals large and small.

To address these increasingly severe cyber threats, CodeHunter has launched a new platform to hunt malicious code across the enterprise. Using a patented approach to behavior computation and binary analysis, CodeHunter automates the detection and analysis of dangerous code — and does it at scale.

CodeHunter: A New Enterprise-Grade Threat to Malware

CodeHunter picks up where existing cybersecurity solutions leave off, discovering vulnerabilities you didn’t know you had.

While today’s cybersecurity relies on signatures, sandboxing, or reverse engineering to determine if a specific file is malware, CodeHunter proactively detects and analyzes threats buried deep within your environment.

CodeHunter’s patented approach dramatically decreases the time to malware discovery and provides you with deep visibility across your entire enterprise. With our detailed analysis, your organization can protect itself from cybercriminals, narrow the cybersecurity skills gap, and automate what — until now — has been a slow manual process.

Learn how CodeHunter can automate threat hunting for your organization here.
 
 
 
 
 
 
 
 
 
 
 

CodeHunter COO Chris O’Ferrell Featured in Forbes

CodeHunter | Blog | Forbes logo
 

December 6, 2021 — CTO Chris O’Ferrell shares his predictions for cyberattacks in 2022 with Forbes magazine, alongside seven other cybersecurity experts:

“Extremely advanced, AI-driven, weaponized malware will emerge with the capability to circumvent most (if not all) of the defensive and detection security technologies used today.” 

Read More: “8 Crystal Ball Predictions About Cyberattacks In 2022

It’s 2022. Why Isn’t Everybody Talking About Malware Hunting and Shadow IT?

 The best defense is a good offense, right? Sure, assuming your offense includes solid surveillance. It’s not enough to know that cybercriminals might come for your data, you need to know when and how. Malware hunting is a good offense — it works with existing security structures to actively uncover weaknesses and potential threats — but it’s up against the rise of shadow IT, a challenge not receiving enough attention.

What is Shadow IT?

Shadow IT is the use of computing systems, devices, software, applications, and services by employees — without the IT department’s knowledge, guidance, or approval. It covers everything from logging in to personal email accounts from a work PC and installing unapproved apps on a company device to using personal flash drives to store work-related data. Guilty of any of the above? You’re not alone: Everyone does it, and organizations are paying the price. While shadow IT can improve employee productivity and drive innovation, it can also introduce serious security risks no matter how well intentioned.

What’s the Big Deal?

With more people working from home, IT departments and cybersecurity personnel are scrambling to enforce safety protocols and procedures — and to keep unsanctioned devices and software installations off their networks. Don’t even mention the nightmare of intermingling personal and professional accounts. Even the best protection surrounding your organization’s email servers won’t protect against an employee getting phished via their personal email.

Most employees don’t realize how easy it is for a malicious outsider to access company software by embedding an innocent-looking malware link sent to a social media account. A run-of-the-mill flash drive in a backpack may contain proprietary data not permitted to be removed from the confines of the organization, or malware triggered when the drive is connected to a corporate network. On top of the potential damage from a cyberattack, there are also legal repercussions to consider if an employee mishandles sensitive data.

How Does Malware Hunting Factor In?

Just staying one step ahead of shadow IT isn’t feasible anymore. By the time a company has shiny new security procedures and processes installed and running, attackers have already poked holes all around them, scraped sensitive data, and moved on to their next mark. By the time end-users catch up, the cycle has already repeated itself. Malware hunting elevates traditional cyber defenses to spot malicious activities before they can do damage.

Effective cybersecurity monitors and analyzes feeds so it can spot a threat by its potential behaviors and remove it through an automated response. And it’s not just limited to external threats: A well-designed system can detect when an insider disrupts their own security measures — intentionally or after falling prey to an attack. It can also be programmed to identify code patterns from known cybercriminal groups. Even if an attack were to be successfully triggered, rapidly understanding the target, source, attack vector and intent helps mitigate the damage.

The laissez-faire approach to personal cybersecurity in a post-pandemic world creates unique challenges for organizations. Fortunately, the latest generation of cybersecurity technology has made huge advances in protecting against the pitfalls of shadow IT.

As with any security structure, even the most advanced system requires maintenance, updates, and consistent testing — but malware hunting (a good offense) will strengthen your defenses against even the most savvy cybercriminals.

How to Reduce Shadow IT in Your Organization

Training in best practices and tailoring your cybersecurity focus to your company’s specific risks go a long way in curtailing the most prevalent uses of shadow IT. Consider:

  • Having IT send fake phishing emails to test employees’ instincts.

  • Automated monitoring of remote devices for unusual activity

  • Prioritized use of two-factor authentication access to high risk systems.

The challenge and cost of implementing malware hunting and addressing shadow IT aren’t going to slow down anytime soon, but neither are cybercriminals. Solid surveillance, evolving technology, and — most importantly — keeping yourself and your colleagues educated about the risks of stale cybersecurity measures and careless habits will help even the score.

A Pivotal Time for Innovation in Cyber — CodeHunter CEO Larry Roshfeld Featured in Technical.ly

 
CodeHunter | Blog | A Pivotal Time for Innovation in Cyber — CodeHunter CEO Larry Roshfeld Featured in Technical.ly

 

December 8, 2021 — CEO Larry Roshfeld spoke to Technical.ly about the state of cybersecurity — and how CodeHunter is primed to disrupt it.

“The real radical difference for us right now, the thing we’re doing that no one else in the world can do, is not just automate the process of investigating software to see if it’s dangerous, but do it at scale.”

Read More: “Cybersecurity startup CodeHunter launches malware hunting SaaS platform