Close Menu
Xarkas BlogXarkas Blog
    What's Hot

    Lava To Launch New Smartphones Under ₹15,000: Check What’s Coming

    April 17, 2026

    Vivo X300 Ultra Launch in India Confirmed: Check Full Specifications and Expected Price

    April 17, 2026

    OPPO F33 And F33 Pro Launched In India With 7,000mAh Battery, Dimensity 6360 Max: Check Price And Specs

    April 17, 2026
    Facebook X (Twitter) Instagram
    Xarkas BlogXarkas Blog
    • Tech News

      Hummer EV Price in India 2026: Complete Guide, Features, Specifications & Availability

      April 2, 2026

      Apple Vision Pro vs Meta Quest 3: The Ultimate VR Headset Showdown

      December 3, 2025

      ChatGPT told them they were special — their families say it led to tragedy

      November 24, 2025

      Beehiiv’s CEO isn’t worried about newsletter saturation

      November 24, 2025

      TechCrunch Mobility: Searching for the robotaxi tipping point

      November 24, 2025
    • Mobiles

      Lava To Launch New Smartphones Under ₹15,000: Check What’s Coming

      April 17, 2026

      Vivo X300 Ultra Launch in India Confirmed: Check Full Specifications and Expected Price

      April 17, 2026

      OPPO F33 And F33 Pro Launched In India With 7,000mAh Battery, Dimensity 6360 Max: Check Price And Specs

      April 17, 2026

      Motorola Edge 70 Pro Launch Date in India and Full Specifications Confirmed Through Flipkart

      April 17, 2026

      Moto Pad 60 Pro and Moto Pad 60 Neo Get a Price Hike in India: Check New Prices

      April 16, 2026
    • Gaming

      Roblox’s AI assistant gets new agentic tools to plan, build, and test games

      April 17, 2026

      How the rewards app Freecash scammed its way to the top of the app stores

      April 15, 2026

      Where Baldur’s Gate 3 Gets Player Agency vs. Narrative Control Right (and Wrong)

      April 14, 2026

      Best Fallout 4 Romance Mods

      April 14, 2026

      Scratch & Peek

      April 14, 2026
    • SEO Tips
    • PC/ Laptops

      Dell Pro 14 (AMD Ryzen AI 7 Pro 350) Review: The Sensible Choice for Everyday Office Work

      January 9, 2026

      CES 2026: MSI Unveils New Prestige, Raider, Stealth and Crosshair Laptops with Intel Core Ultra SoCs

      January 7, 2026

      CES 2026: Samsung Unveils New Galaxy Book6 Laptops

      January 6, 2026

      CES 2026: HP Shows a Keyboard-Based PC and New EliteBooks

      January 6, 2026

      CES 2026: Intel Unveils Core Ultra Series 3, Its First Platform Built on 18A

      January 6, 2026
    • EV

      Hummer EV Price in India 2026: Complete Guide, Features, Specifications & Availability

      April 2, 2026

      Here’s How Much It Costs

      November 15, 2025

      Sodium-Ion Batteries Have Landed In America. The Hard Part Starts Now

      November 15, 2025

      Mazda Begins Testing Its Long-Overdue U.S. EV

      November 14, 2025

      Volkswagen Adds Smartwatch Support For U.S. Vehicles

      November 14, 2025
    • Gadget
    • AI
    Facebook
    Xarkas BlogXarkas Blog
    Home - Latest in Tech - Malware-as-a-Service Thriving Business for Hackers: Report
    Latest in Tech

    Malware-as-a-Service Thriving Business for Hackers: Report

    KavishBy KavishAugust 16, 2024No Comments7 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Malware-as-a-Service Thriving Business for Hackers: Report
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email


    Malicious actors on the internet know the meaning of service. In a report released Tuesday on digital threats for the first half of 2024, a global AI cybersecurity company found that many of the prevalent threats deployed during the period heavily used malware-as-a-service (MaaS) tools.

    The report by Darktrace, based on analysis of data across the company’s customer deployments, reasoned that the growing popularity of MaaS is due to the lucrative subscription-based income of MaaS ecosystems, as well as the low barrier to entry and high demand.

    By offering pre-packed, plug-and-play malware, the MaaS market has enabled even inexperienced attackers to carry out potentially disruptive attacks regardless of their skill level or technical ability, the report added.

    The report predicted that MaaS will remain a prevalent part of the threat landscape in the foreseeable future. This persistence highlights the adaptive nature of MaaS strains, which can change their tactics, techniques, and procedures (TTPs) from one campaign to the next and bypass traditional security tools, it noted.

    “The sophistication of malware-as-a-service services is expected to rise due to the demand for more powerful attack tools, posing challenges for cybersecurity professionals and requiring advancements in defense strategies,” said Callie Guenther, a cyber threat research senior manager at Critical Start, a national cybersecurity services company.

    “These MaaS offerings will introduce new and adaptive attack vectors, such as advanced phishing schemes and polymorphic malware that continually evolves to evade detection,” she told TechNewsWorld. “The rise of malware-as-a-service represents a transformative challenge in the world of cybersecurity. It has democratized cybercrime and expanded the scope of threats.”

    Table of Contents

    Toggle
    • Legacy Malware Thriving in Modern Attacks
    • Double Dipping Digital Desperadoes
    • Attacking the Edge
    • DMARC End Run

    Legacy Malware Thriving in Modern Attacks

    The Darktrace report noted that many MaaS tools, such as Amadey and Raspberry Robin, have used multiple malware families from prior years. This shows that while MaaS strains often adapt their TTPs from one campaign to the next, many strains remain unchanged yet continue to achieve success. It added that some security teams and organizations are still falling short in defending their environments.

    “The continued success of old malware strains indicates that many organizations still have significant vulnerabilities in their security environments,” maintained Frank Downs, senior director of proactive services at BlueVoyant, an enterprise cybersecurity company in New York City.

    Enlighten Autopilot eBook

    “This could be due to outdated systems, unpatched software, or a lack of comprehensive security measures,” he told TechNewsWorld. “The persistence of these older threats suggests that some organizations may not be investing adequately in cybersecurity defenses or are failing to follow best practices for system maintenance and updates.”

    Roger Grimes, a defense evangelist for KnowBe4, a security awareness training provider in Clearwater, Fla., added that most anti-malware detection software is not as good as its vendors claim.

    “Organizations need to know they cannot rely on malware detection as being even close to 100% effective, and they need to respond and defend accordingly,” he told TechNewsWorld. “Anti-malware software alone will not save most organizations. All organizations need multiple defenses across multiple layers to best detect and defend.”

    Double Dipping Digital Desperadoes

    Another finding in the report was that “double extortion” was becoming prevalent among ransomware strains. With double extortion, malicious actors will not only encrypt their target’s data but also exfiltrate sensitive files with the threat of publication if the ransom is not paid.

    “Double-extortion started in November 2019 and reached levels over 90% of all ransomware using this strategy within a few years,” Grimes said.

    “It’s popular because even victims with a really good backup aren’t negating the entirety of the risk,” he continued.

    “The percentage of victims paying ransoms has gone down significantly over time, but the ones who are paying are paying far more, many times to protect the stolen confidential data from being released publicly or used against them in a future attack by the same attacker,” he said.

    Matthew Corwin, managing director of Guidepost Solutions, a global security, compliance, and investigations firm, added that the threat of double extortion makes the need for a data loss prevention program even more critical for organizations. “DLP implementation for all endpoints and other cloud assets should include data classification, policy enforcement, real-time blocking, quarantining, and alerting,” he told TechNewsWorld.

    Attacking the Edge

    Darktrace also reported that malicious actors continued to execute during the first six months of the year mass-exploitation of vulnerabilities in edge infrastructure devices, such as Ivanti Connect Secure, JetBrains TeamCity, FortiClient Enterprise Management Server, and Palo Alto Networks PAN-OS.

    Initial compromises of these systems can act as a springboard for malicious actors to conduct further activities, such as tooling, network reconnaissance, and lateral movement, the report explained.

    “By compromising edge devices, attackers can gain a strategic foothold in the network, allowing them to monitor and intercept data traffic as it passes through these points,” Downs explained.

    “This means that a carefully exploited edge device can provide attackers with access to a wealth of corporate information, including sensitive data, without the need to compromise multiple internal systems,” he continued. “This not only makes the attack more efficient but also increases the potential impact, as edge devices often handle significant data flows to and from the network.”

    Enlighten Autopilot eBook

    Morgan Wright, chief security advisor at SentinelOne, an endpoint protection company in Mountain View, Calif., added, “Many organizations are most likely behind in patching vulnerable devices, like firewalls, VPNs, or email gateways.”

    “It doesn’t help when there are numerous and critical vulnerabilities,” he told TechNewsWorld. “For attackers, it’s the digital equivalent of shooting fish in a barrel.”

    KnowBe’s Grimes agreed that maintenance of edge infrastructure devices is often lax. “Sadly, edge devices have for decades been among the most unpatched devices and software in our environments,” he said. “Most IT shops spend the bulk of their patching effort on servers and workstations. Attackers look at and exploit edge devices because they are less likely to be patched and often contain shared administrative credentials.”

    DMARC End Run

    After analyzing 17.8 million emails, the Darktrace researchers also discovered that 62% could bypass DMARC verification checks.

    DMARC is designed to verify that an email message is from the domain it claims it’s from, but it has limitations. Scammers can create domains with names close to a well-known brand and DMARC them. “So as long as they can sneak the fake look-alike domain past victims, their emails will get past DMARC checks,” Grimes explained.

    “The alarming statistics in the latest Darktrace Half-Year Threat Report highlight the need for organizations to adopt a multi-layered approach to email security, incorporating advanced AI-driven anomaly detection and behavioral analysis to complement traditional security measures,” added Stephen Kowski, field CTO of SlashNext, a computer and network security company, in Pleasanton, Calif.

    “This holistic strategy can help identify and mitigate sophisticated phishing attacks that evade DMARC and other conventional defenses,” he told TechNewsWorld. “By continuously monitoring and adapting to evolving threat patterns, organizations can significantly enhance their email security posture.”

    Dror Liwer, co-founder of Coro, a cloud-based cybersecurity company based in Tel Aviv, Israel, contends that most of the report’s findings point to the same cause. Citing a report released by Coro earlier this year, he noted that 73% of security teams admit to missing or ignoring critical alerts.

    “Too many disparate tools, each needing maintenance, regular updates, and monitoring, lead to security teams dealing with administration instead of protection,” he told TechNewsWorld.

    Wright, though, suggested the findings might point to a bigger industry flaw. “With all the money being spent on cybersecurity and the threats that continue to proliferate, it begs the question — are we spending enough money on cybersecurity, or just spending it in the wrong places?” he asked.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Kavish
    • Website

    Related Posts

    Hummer EV Price in India 2026: Complete Guide, Features, Specifications & Availability

    April 2, 2026

    Apple Vision Pro vs Meta Quest 3: The Ultimate VR Headset Showdown

    December 3, 2025

    ChatGPT told them they were special — their families say it led to tragedy

    November 24, 2025

    Beehiiv’s CEO isn’t worried about newsletter saturation

    November 24, 2025

    TechCrunch Mobility: Searching for the robotaxi tipping point

    November 24, 2025

    X’s new About This Account feature is going great

    November 24, 2025
    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Lava To Launch New Smartphones Under ₹15,000: Check What’s Coming

    April 17, 2026

    Vivo X300 Ultra Launch in India Confirmed: Check Full Specifications and Expected Price

    April 17, 2026

    OPPO F33 And F33 Pro Launched In India With 7,000mAh Battery, Dimensity 6360 Max: Check Price And Specs

    April 17, 2026

    Motorola Edge 70 Pro Launch Date in India and Full Specifications Confirmed Through Flipkart

    April 17, 2026
    About Us
    About Us

    Email Us: info@xarkas.com

    Facebook Pinterest
    © 2026 . Designed by Xarkas Technologies.
    • Home
    • Mobiles
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.