Hi all, Trick Bot, another one of these notorious havocs is back. According to Trickbot Watch: Arrival via Redirection URL in Spam we’re not out of the woods yet. With the amount of spam that is out there, we really need to be on our guard. We can’t let up just because of the fact that its safe to open. As I find other articles that I can talk about here on the blog, we must continue to be on guard for things that we may not be expecting and slow down a bit. Here’s just one section of the article.
Defending against Trickbot: Trend Micro recommendations and solutions
Trickbot has seen developments beyond that of a typical banking trojan, and updates to it aren’t likely to go away anytime soon. For instance, it has also
been found being delivered as a payload by attacks like those of
Emotet.
Cybercriminals that take advantage of Trickbot primarily use phishing techniques that trick users into downloading attachments and visiting malicious sites
that steal their credentials.Users and enterprises can protect themselves by following these best practices against spam and other phishing techniques:
list of 4 items
• Be wary of telltale signs of spam such as suspicious sender addresses and glaring grammatical errors.
• Refrain from opening email attachments from unverified sources.
• Keep comprehensive logs of what happens within the network, which allows IT personnel to track suspicious activities like traffic from malicious URLs.
• Monitor the network for potential threats, which can help an organization to identify malicious activities that traditional security solutions might
not be able to detect.
list endUsers and enterprises can also benefit from protection that uses a multilayered approach against risks brought by threats like Trickbot. We recommend employing
endpoint application control that reduces attack exposure by ensuring only files, documents, and updates associated with whitelisted applications and sites
can be installed, downloaded, and viewed. Endpoint solutions powered by
XGen™ security
such as
Trend Micro™ Security,
Trend Micro™ Smart Protection Suites,
Trend Micro Worry-Free™ Business Security,
and
Trend Micro Network Defense
can detect malicious files and URLs and protect users’ systems.
To get the proper formatting, please view the full HTML article, but I give this section to give you the idea of how bad this is. As Security Now has said, it only gets worse, right? Please leave those thoughts.
Discover more from Jared's Technology podcast network
Subscribe to get the latest posts sent to your email.