Advancements in malware have changed the landscape of cybersecurity, says eSentire

When it comes to protecting an organization from malware, it’s a constant game of cat and mouse, according to Sean Blenkhorn, the chief product officer for eSentire Inc., who recently published a report in partnership with Carbon Black titled “Threat Intelligence Spotlight: The Shifting Framework of Modern Malware”.

“The attackers always have what we call first-mover advantage. The reality is we’re always having to keep up with what they’re doing now,” said Blenkhorn in an interview with IT World Canada. “Attackers have gotten smarter and the tools and the capabilities are there to carry out the attacks.”

Among the most recent malware trends identified in the report are polymorphing malware, fileless attacks, and managed campaigns.


Managed campaigns have especially changed the landscape. Not only is malware more simple to execute than ever before, there are now tools to help bad actors manage their malware campaigns without the need for a majority of the skills that would have been required before.

“The infrastructure is set up. There’s kind of a black market within the adversary space where there’s folks that can own that infrastructure… to distribute new malware, new ransomware, more broadly. There’s an actual marketplace for that,” said Blenkhorn. “That means that it’s opened up to a much broader set of individuals that can leverage those.”

On top of all of that, the expanded availability of ransomware provides motivation for a much wider range of individuals as they can seek money as a ransom, instead of needing to be able to leverage value from the data they have managed to capture itself.

All of this put together adds up to a landscape that now includes many more bad actors that no longer need as many skills but are as equally motivated to steal your data.

Sean Blenkhorn says that the advantage will always lie with bad actors in the fight for cybersecurity. Credit: LinkedIn

“The introduction of ransomware has changed the paradigm. With ransomware, that was a major shift for them to be able to say ‘I don’t really care what your business does or the value of your information outside of your four walls. I know access to your systems is valuable to you. So if I restrict access to that, that’s a means to extort you financially.’ That certainly increases the people who are interested in getting into that because they see that as an easy win,” said Blenkhorn .

This is not to say that the battle is pointless for cybersecurity experts, he added.

Two of the main recommendations from the report – both of which Blenkhorn supports – are modern endpoint security platforms and applying multi-layer defense systems.

“Modern endpoint defense is essential. It is challenging for organizations, but it’s absolutely essential. With the malware and the threats that we’re seeing today, traditional antivirus can’t keep up with it. We need to look at the endpoint solutions that are falling into that next-gen category,” he said. “Endpoint alone is not a single point solution. You’ve got to layer that in… including endpoint, including end-user awareness, including email protection.”

Surprisingly, despite all of the high-tech advancements, one thing hasn’t changed. Malware is still most commonly entering systems through one of the oldest and most used entry points – email phishing. According to the survey, 67 per cent of malware enters systems through email.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Buckley Smith
Buckley Smith
Staff writer for IT World Canada. Covering the world of technology as it applies to business. Buckley is an avid sports fan who loves travel, food, and music. Can be contacted at [email protected] or 416-290-2000.

Featured Story

How the CTO can Maintain Cloud Momentum Across the Enterprise

Embracing cloud is easy for some individuals. But embedding widespread cloud adoption at the enterprise level is...

Related Tech News

Get ITBusiness Delivered

Our experienced team of journalists brings you engaging content targeted to IT professionals and line-of-business executives delivered directly to your inbox.

Featured Tech Jobs