01/16/2025 | Press release | Distributed by Public on 01/16/2025 02:33
PALO ALTO, Calif., January 16, 2025 - HP Inc. (NYSE: HPQ) today issued its latest Threat Insights Report, highlighting how threat actors are using malware kits and generative artificial intelligence (GenAI) to improve the efficiency of their attacks. Such tools are reducing the time and skill needed to create attack components, enabling attackers to focus onexperimenting with techniques to bypass detection and trick victims into infecting their endpoints, such asembedding malicious code inside images.
The report provides an analysis of real-world cyberattacks, helping organizations to keep up with the latest techniques cybercriminals are using to evade detection and breach PCs in the fast-changing cybercrime landscape. Based on data from millions of endpoints running HP Wolf Security1, notable campaigns identified by HP threat researchers include:
"The campaigns analyzed provide further evidence of the commodification of cybercrime. As malware-by-numbers kits are more freely available, affordable, and easy to use, even novices with limited skills and knowledge can put together an effective infection chain. Throw GenAI into the mix to write the scripts, and the barriers to entry get even lower. This allows groups to concentrate on tricking their targets and picking the best payload for the job - for instance by targeting gamers with malicious cheat repositories."
By isolating threats that have evaded detection tools on PCs - but still allowing malware to detonate safely - HP Wolf Security has specific insight into the latest techniques used by cybercriminals. To date, HP Wolf Security customers have clicked on over 65 billion email attachments, web pages, and downloaded files with no reported breaches.
The report, which examines data from calendar Q3 2024, details how cybercriminals continue to diversify attack methods to bypass security tools that rely on detection, such as:
"Cybercriminals are rapidly increasing the variety, volume, and velocity of their attacks. If a malicious Excel document is blocked, an archive file in the next attack may slip through the net. Instead of trying to detect rapidly shifting infection methods, organizations should focus on reducing their attack surface. This means isolating and containing risky activities such as opening email attachments, clicking on links, and browser downloads to reduce the chances of a breach."
HP Wolf Security1 runs risky tasks in isolated, hardware-enforced virtual machines running on the endpoint to protect users, without impacting their productivity. It also captures detailed traces of attempted infections. HP's application isolation technology mitigates threats that can slip past other security tools and provides unique insights into intrusion techniques and threat actor behavior.
About the Data
About HP Wolf Security