There’s a reason why companies have so much trouble keeping up with cyber attackers. Every time you think your new security appliance is the perfect defense, attackers change things up to stay one step ahead.
And now, the bad guys are taking advantage of fake news, getting you to click on infected links and launch malvertising campaigns.
Don’t lose hope! Be aware, be alert—and most importantly, be ready to respond to attacks!
Social media has become the primary source of news for so many people. This might fit into today’s digital demands, but it also opens the door for cyber criminals to show off their social engineering skills and launch new types of attacks.
Especially in the wake of this past election season, fake news has become a mainstream problem. Even Google and Facebook have started to address the problem as fake news sites leverage the low barriers to entry for their ad networks.
Some ways that fake news is becoming a problem for users include:
These social attacks typically come in the form of malvertising (malicious advertising).
Malvertising is a type of attack in which hackers leverage online ad networks to inject websites with malware-infused advertisements. This is different than a basic phishing campaign where attackers want to trick you into clicking a malicious link.
Instead, attackers want to infect a website with legitimate traffic and spread their malware at scale. We might think about fake news as illegitimate—but that’s the problem. Fake news sites have built real audiences through scare tactics and exaggerated stories that people believe. When these people have been tricked into visiting fake news sites, attackers can strike and deliver threats.
That being said, malvertising isn’t just a fake news problem. Big media companies like Yahoo!, The New York Times, BBC and more have all been hit by malvertising campaigns. How are we letting this happen?
According to Malwarebytes Labs, the problem is that attackers can sign up for ad networks and lace their advertisements with invisible web elements that force drive-by downloads of malware when you visit a website. Sure, this could happen to any website. But you’re more likely to run into it if you’re on a fake news site!
With so many problems arising with fake news, there has been a boom in lists of fake news websites. Whether it’s Wikipedia’s list, the great “False, Misleading, Clickbait-y, and Satirical ‘News’ Sources” list, or another collection, you have plenty of help to identify fake news sources.
But even if you avoid these sites, browse safely online, and avoid malicious links, malvertising is passive to the point that you can still be infected. There are steps you can take to be better-protected, but you have to be prepared to respond just in case!
One important note about malvertising—it’s simply a vehicle to deliver malware that targets your machine’s vulnerabilities. So you can’t just focus on stopping malvertising infections. You have to know how to remove the malware it delivers.
Research shows that 70% of malvertising campaigns deliver ransomware as a payload. What you really need is a plan to respond to growing ransomware threats.
Ransomware: Hostage Rescue Manual, you can learn to survive a ransomware scare from a malvertising campaign.
There’s no doubt that malvertising and fake news are growing, formidable challenges. If you are managing a corporate network, one of the keys to security is to ensure visibility for your network traffic and in-line appliances.
If you want to learn more about guaranteeing visibility with the right security architecture, download this free white paper, Managing the Edge of the Network: A New Necessity for Security Architects.
If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.
If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.
While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.
Some of you may have noticed a flaw in the logic behind this solution! You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.
Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.
Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.
Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.