{"id":23863,"date":"2024-02-06T07:11:12","date_gmt":"2024-02-06T15:11:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/02\/06\/news-17593\/"},"modified":"2024-02-06T07:11:12","modified_gmt":"2024-02-06T15:11:12","slug":"news-17593","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/02\/06\/news-17593\/","title":{"rendered":"State of Malware 2024: What consumers need to know"},"content":{"rendered":"\n<p>Released today, the Malwarebytes <a href=\"https:\/\/try.threatdown.com\/2024-state-of-malware\/?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2b_ws_global_2024_state_of_malware_170673145305\">State of Malware 2024 report<\/a> takes a deep dive into the latest developments in the world of cybercrime.&nbsp;<\/p>\n<p>As home users, many of the threats we cover will only affect you second hand, such as disruptions after a company suffers a ransomware attack, or when your private information is sold online after a data breach. Sadly, there&#8217;s not a lot you can do to prevent incidents like these yourself, other than <a href=\"https:\/\/www.malwarebytes.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\">stay on top of the news<\/a> and <a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\" target=\"_blank\" rel=\"noreferrer noopener\">protect yourself against identity theft<\/a>.&nbsp;<\/p>\n<p>But other threats you can do something about. So in this article we&#8217;ll focus on what threats affect you directly and how you can protect yourself.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-privacy-nbsp\">Privacy&nbsp;<\/h2>\n<p>In the last year, the UK\u2019s <a href=\"https:\/\/www.gov.uk\/government\/news\/uk-children-and-adults-to-be-safer-online-as-world-leading-bill-becomes-law\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Online Safety Act<\/a> attempted to challenge the status quo for social media and messaging companies. The act was widely interpreted as a demand that companies scan users\u2019 messages for illegal material, and is a first warning about the directions in which <a href=\"https:\/\/www.malwarebytes.com\/vpn\" target=\"_blank\" rel=\"noreferrer noopener\">privacy<\/a> may continue to be threatened in the name of greater good.&nbsp;&nbsp;<\/p>\n<p>It also acts as a reminder to be careful about what you share, even if you are under the impression that you are using the internet securely. We have seen news of <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/01\/chatgpt-accused-of-breaking-data-protection-rules\">ChatGPT leaking user\u2019s information<\/a> and law enforcement asking for <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/whatsapp-refuses-to-weaken-encryption-would-rather-leave-uk\">backdoors in encryption<\/a> routines.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-passwords-nbsp\">Passwords&nbsp;<\/h2>\n<p>Google and Microsoft made good on their promise to back <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/05\/google-passkey-how-to-create-one-and-when-you-shouldnt\">passkeys<\/a>, an encryption-based alternative to passwords that can\u2019t be stolen, guessed, cracked, or phished.<\/p>\n<p>We&#8217;d like to see more companies embrace new methods of authentication and wave passwords goodbye: Too many breaches have shown us that user education only works for those that were already doing the right things. Keeping track of the hundreds of passwords an average user has, along with the relative complexity of using a password manager have convinced us it\u2019s time for a better alternative.&nbsp;<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-malvertising-nbsp\">Malvertising&nbsp;<\/h3>\n<p>If the last year has taught us something, it\u2019s that scammers and malware peddlers can afford to buy sponsored search results and outbid the brand owner so that their links come out on top. Cybercriminals create Google Search ads mimicking popular brands, which lead to highly realistic, replica web pages where users are scammed or tricked into downloading malware.&nbsp;<\/p>\n<p>Despite efforts on the side of search providers like Google, the cybercriminals remained one step ahead, able to consistently bypass ad verification checks all year. The type of malware that&#8217;s used varies with each campaign but infostealers (which gather information from your computer, such as usernames and passwords) were the most common type.&nbsp;<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-banking-trojans-nbsp\">Banking Trojans&nbsp;<\/h3>\n<p>Banking trojans are one of the most serious threats facing <a href=\"https:\/\/www.malwarebytes.com\/android\" target=\"_blank\" rel=\"noreferrer noopener\">Android devices<\/a>. Banking trojans come disguised as regular apps like QR code scanners, fitness trackers, or even copies of popular apps like Instagram.&nbsp;<\/p>\n<p>The malicious app asks the user for permissions that allow it to monitor what happens in other apps and will then create overlay screens for legitimate apps. This allows them to capture login credentials and even <a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication (MFA)<\/a> tokens.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-mac-malware-nbsp\">Mac malware&nbsp;<\/h3>\n<p>The days of \u201cmy Mac is safe\u201d and \u201cMacs don&#8217;t get malware\u201d are definitely over. There are many signs that criminals are taking note of the platform\u2019s increasing popularity by enabling attacks to target both Windows and Mac users at the same time.&nbsp;<\/p>\n<p>Contrary to outdated beliefs, <a href=\"https:\/\/www.malwarebytes.com\/mac\" target=\"_blank\" rel=\"noreferrer noopener\">malware for Macs<\/a> has always existed, it was just considered less serious since most Mac malware was <a href=\"https:\/\/www.malwarebytes.com\/blog\/threats\/adware\">adware<\/a> or <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/how-to-avoid-potentially-unwanted-programs\">potentially unwanted programs (PUPs)<\/a>. This is changing. For example, in September, 2023, Malwarebytes <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/atomic-macos-stealer-delivered-via-malvertising\" target=\"_blank\" rel=\"noreferrer noopener\">discovered a cybercriminal campaign spreading Atomic Stealer (AMOS)<\/a> malware to Mac users through malicious ads.&nbsp;AMOS malware can steal passwords from browsers and Apple\u2019s Keychain, as well as grab files.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-012c1351-e685-481e-acf0-85494bb687fd\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/try.threatdown.com\/2024-state-of-malware\/?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2b_ws_global_2024_state_of_malware_170673145305\">READ THE REPORT<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<h3 class=\"wp-block-heading\" id=\"h-malwarebytes-nbsp-nbsp\">Malwarebytes&nbsp;&nbsp;<\/h3>\n<p>Malwarebytes has solutions to safeguard individuals\u2019 data and identities. We can protect your <a href=\"https:\/\/www.malwarebytes.com\/android\" target=\"_blank\" rel=\"noreferrer noopener\">Android<\/a> and <a href=\"https:\/\/www.malwarebytes.com\/ios\" target=\"_blank\" rel=\"noreferrer noopener\">iOS<\/a> devices, <a href=\"https:\/\/www.malwarebytes.com\/mac\" target=\"_blank\" rel=\"noreferrer noopener\">Macs<\/a>, <a href=\"https:\/\/www.malwarebytes.com\/chromebook\" target=\"_blank\" rel=\"noreferrer noopener\">Chromebooks<\/a>, and <a href=\"https:\/\/www.malwarebytes.com\/premium\" target=\"_blank\" rel=\"noreferrer noopener\">Windows<\/a> systems. We also have software to <a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\" target=\"_blank\" rel=\"noreferrer noopener\">protect your identity<\/a>, <a href=\"https:\/\/www.malwarebytes.com\/vpn\" target=\"_blank\" rel=\"noreferrer noopener\">safeguard your online privacy<\/a>, and <a href=\"https:\/\/www.malwarebytes.com\/browserguard\" target=\"_blank\" rel=\"noreferrer noopener\">block unwanted ads and trackers<\/a>.&nbsp;&nbsp;<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/personal\/2024\/02\/state-of-malware-2024-what-consumers-need-to-know\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The State of Malware 2024 report covers some topics that are of special interest to home users: privacy, passwords, malvertising, banking Trojans, and Mac malware. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[32,26699,11196,17276],"class_list":["post-23863","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-news","tag-personal","tag-state-of-malware","tag-state-of-malware-report"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23863"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23863\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23863"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}