Blended Threat

6th August 2020 | Cybrary Blended Threat


blended threat cybrary

A Blended Threat is a computer network attack that seeks to maximize the severity of damage and speed of contagion by combining methods—for example, using characteristics of both viruses and worms. A blended threat often involves an infection chain that begins with a user visiting a website and then diverted to a malicious URL. After this, social engineering lures will lead the user to download a malicious file which will continue to download additional malicious files. By using multiple methods and techniques, cybercriminals are able to quickly and quietly invade your network many times, leading to ransomware and extortion demands.

Source: TrendMicro

Additional Reading: Secret Service Creates Cyber Fraud Task Forces

Related Terms: Trojan Horse, Virus, Worm

What does this mean for an SMB?

Attacks like these can be prevented. The best way to do this is by training your staff. If you’re an MSP, you should consider training your clients to lower your critical support events. In many cases, business owners don’t realize that the threats don’t stop at the office doors.  Employees go home and may have less secure measures in place to defend against cyber threats. That can lead to an infection from home invading your business network and services. Protect your staff and your business through awareness and knowledge. 

 Follow CyberHoot’s best practices to reduce the likelihood of your business becoming a victim:

  • Train employees on cybersecurity basics, helping them become more aware of the threats they face when interacting online. (Phishing, Social Engineering Attacks)
  • Periodically Phish Test Employees (at least annually, but preferably quarterly or monthly)
  • Be wary of public, unsecured WiFi (use a VPN if dealing with sensitive information)
  • Govern employees with the proper policies, following NIST Guidelines (WISP, Acceptable Use, Password Policy, etc) 
  • Employ a Password Manager, require it in your Password Policy, demand strong password hygiene in your employees and business 
  • Enable Two-Factor Authentication wherever possible and especially on all Internet facing services you use (O365, Salesforce, Finance apps. etc.)
  • Work with your IT staff or third party vendors to ensure your critical data is being encrypted at rest and in transit (ensure keys are strong and passwords long)
  • Regularly backup critical data following the 3-2-1 methodology
  • Use the principle of least privilege 
  • Patch your systems regularly and triage critical vulnerabilities using a repeatable process with established timelines based upon threat levels
  • Stay current with the always-changing cyber threats.

By implementing these measures at your business you’ll become more aware and more secure. You may not have perfect security but you’ll be doing what you can to reduce the risks you face.

Blended Threats Explained:

CyberHoot loves this video explanation of Blended Threats despite it being created way back in 2009.  It is thorough, easily understood, and well constructed.  All of the technologies discussed, antivirus, behavior based analysis, are as appropriate today as 11 years ago.  This technology vendor’s behavior based approach to threat blocking is sound and should be considered in your cybersecurity toolbox.

The only technology recommendation missing from this video is the advent of Domain Name Services (DNS) protection.  Consider deploying Cisco Umbrella, WebRoot DNS protection or something similar.

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

CyberHoot Newsletter – June 2025

CyberHoot Newsletter – June 2025

CyberHoot June Newsletter: Stay Informed, Stay Secure Welcome to the June edition of CyberHoot’s newsletter,...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more