Ransomware, Phishing and Endpoint Attacks: The Top 3 Cyberthreats

Cyberthreats have been prevalent on the internet for decades now. Unfortunately, malware has been evolving more rapidly than the anti-malware software needed to combat it. The three most active cyberthreat categories worldwide are currently ransomware, phishing and endpoint attacks.


Ransomware is malicious software that encrypts data on a target system and demands a ransom in exchange for restoring access to the encrypted data. The demand is typically in Bitcoin and requires a digital key to unlock the files. These attacks range from low-level nuisances to serious incidents such as the data lockdown of several organizations.

The recent incident of the ransomware “Petya,” which hit Ukraine in 2017 and cascaded to several countries, brought to light the extent of damage ransomware can bring. The attack spread through Ukrainian government systems that use Microsoft Windows, which resulted in the ransomware shutting down banks, state power utilities, ATMs, airports and metro systems. It also resulted in the Chernobyl radiation monitoring system to go offline and forced officials to check radiation levels manually. The ransomware demanded $300 Bitcoin, which allegedly was paid by various companies.

Preventing ransomware begins with updating and patching operating systems and applications regularly. Furthermore, regular backups of all systems on a network can greatly reduce the damage caused by a successful attack. Users should be wary of suspicious files they receive and make sure they understand how to identify and filter malicious emails. Finally, be sure that a reputable antimalware solution is installed on all systems.

Security monitoring grants real-time visibility of users and their devices. Through monitoring, software professionals can verify security and compliance requirements regardless of whether data is stored locally, in a database, in a virtual environment or in the cloud. Additionally, monitoring solutions classify devices by type, owner and operating system to deliver insights and make preventing and responding to risks easier. Here are just a few effective ways to implement security monitoring:

  • Use analytics to build a connectivity map within your infrastructure to detect anomalies in hosts and their connection patterns.
  • Use process monitoring to detect changes in process footprints.
  • Set up effective file access monitoring to detect large-scale changes to files, and quarantine suspicious hosts immediately to stop malware from spreading.


Phishing attacks are difficult to detect. They often appear to be everyday emails from known and trusted sources and trick users into installing malware on their devices, giving hackers access to their victims’ workstations.

These attacks often are used to steal confidential user data such as credit card numbers and login credentials. The attacker purports to be a trusted source or entity and convinces the target to click on a malicious link, which often leads to the installation of malware or to a fake login page under the attacker’s control.

Proactively blocking malicious emails and securing email gateways can reduce the users’ exposure to generic, opportunistic campaigns. Many security solutions also include features to help identify breaches and support regulatory compliance. Creating awareness among users, conducting training and running simulations also can reduce the effectiveness of phishing attacks.

Combining phishing awareness with training provides users an easy way to act on their knowledge and empowers users to take charge of their own security. Being able to identify affected user accounts and their credentials is crucial. Supplementing user-based reporting with detection capabilities provides complete end-to-end visibility to the security authorities in an organization—when employees report breaches themselves, there is more time to take countermeasures that limit their impact.

A few anti-phishing monitoring techniques are listed below:

  • Set up an effective endpoint monitoring strategy to detect maliciously spawned child processes that might be used to steal data (discussed further in the next section).
  • Identify malicious files and URLs within emails by forwarding messages to a sandbox or use lookups with service providers that maintain databases of known malicious files and URLs.

Endpoint Attacks

Endpoint attacks target user systems rather than their servers. These user systems are entry points to network and include smartphones, computers, laptops and fixed-function devices. Endpoint attacks also affect the shared folders, network-attached storage (NAS) and hardware such as server systems.

Endpoint security is implemented on the user systems to prevent them from running malicious threats, which may be internal or external, from malware or non-malware, data theft and system disruption. A way to prevent an endpoint attack is by setting up high endpoint security that combines prevention, detection, monitoring and determining root causes of an attack.

It is important to note that endpoint security is very different from traditional antivirus mechanisms as it uses predictive analyses instead of reactive actions.

Therefore, organizations should set up endpoint-monitoring solutions that monitor connection activity and can identify an anomaly indicating a potential threat. Another way to combat an endpoint attack is through behavioral analytics. It observes parameters such as user behavior, network behavior and other entities that connect to it, and looks for patterns and tasks that are not within the norm.

Other steps include removing administrative access from an endpoint system, which do not require administrative rights for everyday applications; keeping systems up to date; and implementing advanced authentication.

These monitoring techniques can help to prevent endpoint attacks:

  • Set up effective process profiling to identify, validate and investigate unknown processes spawned on endpoint systems.
  • Analyze connections made by endpoints to identify malicious transactions between hosts.

Shomiron Dasgupta

Avatar photo

Shomiron Dasgupta

With his extraordinary skillset as an intrusion analyst and immense passion for tech advancements, he has been building threat detection systems for close to two decades and has established partners in 14 countries across several industries like healthcare, insurance, transport, banking, and media. Prior to founding and developing DNIF, a product that delivers quality attack detection products and services to its customers, he worked with ICICI Infotech Ltd. as a Senior Consultant, where his core responsibility was to solve critical cybersecurity challenges faced by customers. Shomiron, a TedX speaker, is also an eminent speaker at many industry events including DSCI (Data Security Council of India) and SACON (Sálim Ali Centre for Ornithology and Natural History). He is an alumnus of St. Xavier’s college. Outside the tech world, he is a trained mountaineer with expedition experience in the high Himalayas.

shomiron-dasgupta has 4 posts and counting.See all posts by shomiron-dasgupta

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)