A Blended Threat is a computer network attack that seeks to maximize the severity of damage and speed of contagion by combining methods—for example, using characteristics of both viruses and worms. A blended threat often involves an infection chain that begins with a user visiting a website and then diverted to a malicious URL. After this, social engineering lures will lead the user to download a malicious file which will continue to download additional malicious files. By using multiple methods and techniques, cybercriminals are able to quickly and quietly invade your network many times, leading to ransomware and extortion demands.
Source: TrendMicro
Additional Reading: Secret Service Creates Cyber Fraud Task Forces
Related Terms: Trojan Horse, Virus, Worm
Attacks like these can be prevented. The best way to do this is by training your staff. If you’re an MSP, you should consider training your clients to lower your critical support events. In many cases, business owners don’t realize that the threats don’t stop at the office doors. Employees go home and may have less secure measures in place to defend against cyber threats. That can lead to an infection from home invading your business network and services. Protect your staff and your business through awareness and knowledge.
Follow CyberHoot’s best practices to reduce the likelihood of your business becoming a victim:
By implementing these measures at your business you’ll become more aware and more secure. You may not have perfect security but you’ll be doing what you can to reduce the risks you face.
CyberHoot loves this video explanation of Blended Threats despite it being created way back in 2009. It is thorough, easily understood, and well constructed. All of the technologies discussed, antivirus, behavior based analysis, are as appropriate today as 11 years ago. This technology vendor’s behavior based approach to threat blocking is sound and should be considered in your cybersecurity toolbox.
The only technology recommendation missing from this video is the advent of Domain Name Services (DNS) protection. Consider deploying Cisco Umbrella, WebRoot DNS protection or something similar.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.