ESET combines with Google to improve the security of the Google Chrome browser
Google and ESET have combined Chrome’s sandbox technology with ESET’s detection engine to create the Chrome Cleanup tool included in the latest version of Google Chrome. The new version of tool has been developed with the vision of allowing internet users to browse the web safely and without interruption.
“Under the hood, we upgraded the technology we use in Chrome Cleanup to detect and remove unwanted software. We worked with IT security company ESET to combine their detection engine with Chrome’s sandbox technology. We can now detect and remove more unwanted software than ever before, meaning more people can benefit from Chrome Cleanup.” – Philippe Rivard, Product Manager, Chrome Cleanup.
Chrome Cleanup is now able to detect unwanted software such as pop-up ads, unwanted extensions, toolbars and browser redirecting software, and single it out for removal thereby allowing internet users to enjoy safer technology.
Chrome Cleanup runs in the background while users are browsing on Chrome and alerts users to potential threats. It then gives users the option to quickly remove this harmful or unwanted software and restore Chrome to its default settings.
“Using the internet should always be a smooth and safe experience for everyone,” said Juraj Malcho, Chief Technology Officer at ESET. ““For three decades, ESET has developed a number of security solutions that allow users to safely enjoy their technology and to mitigate a variety of cyber threats. Chrome Cleanup addresses unwanted software that can negatively influence a users’ experience on the internet.”
Cyber security attacks have become more frequent, more advanced and more difficult to identify. Take the worry out of your browsing experience and download the ESET protected Chrome Cleanup tool here.
In ongoing consultations with clients,
large companies named targeted attacks and hacking as two of their biggest
security challenges since they can seriously impact the continuity of business
activities in an organization.
Attackers have many means to infiltrate
companies. However, many attacks, don’t require a very high level of
technological sophistication. Instead, techniques like targeted social
engineering, i.e. spear
phishing, or the use of known vulnerabilities for which,
patches may have been issued but businesses have not yet deployed, can lead to
damaged reputation, revenue and data breaches.
On the other hand, high levels of sophistication can also be utilized as is in
the case of a Zero Day attack. Chief
among these was Stuxnet,
a recorded attack where malicious code successfully deployed four zero-day
vulnerabilities to impede a uranium enrichment program in Iran, and which,
according to media, was a state-sponsored attack.
There are many reasons why organizations
become repeat targets. Their bank accounts contain more resources than those of
an average person or small business and they also have considerable amounts of
interesting data that can be monetized. Attacks targeting companies can also be
used as a form of competition. Most often, this concerns data hunting,
i.e. obtaining interesting information or intellectual property. These attacks
can be accompanied by blackmail. For example, a client database is stolen from
a company and is later approached by the perpetrators and asked, “what they are
going to do about their loss”.
Different ways to monetize attacks bring
Organizations often find it difficult to admit they have been breached by these types of attacks. Consequently, this may give other companies the false impression that such attacks happen only occasionally. A typical example of targeted attacks, common in recent years, are DDoS as a Service – attacks, which are sponsored by one company to attack the website of another, with the effect of disrupting business and directing customers away from the targeted company and (possibly) towards the attacker’s “employer”. These are criminal tactics, and the attackers know very well which business areas to target for maximum gain.
There are of course other approaches. Take the example of the British National Health Service, which has become a frequent target of ransomware attacks. Digitization of health services has resulted in a situation where the malicious encryption of medical data may lead to a halt in medical interventions and surgeries. Under such conditions, targeted organizations are often more inclined to pay a ransom for the “hijacked” patient data.
In Kenya attackers have been known to target their attacks to banks and financial institutions, with figures of Ksh400 million being reported stolen from an unnamed local bank and Ksh29 million from National Bank of Kenya in 2018 alone.
Innovative approaches to old tricks
In many rural areas worldwide, one quick glance at powerlines will reveal how
easy it is to make illegal connections to the power grid. As of late,
cyberattackers have followed a similar model, focusing their resources on
illegally mining various cryptocurrencies, which have proven to be
highly popular in the public’s imagination.
A more complex example was a targeted attack meant to infect StatCounter,
which provides a service very similar to
Google Analytics and uses a special script legitimately placed on websites to
obtain data about website visitors. In this case, attackers successfully
breached StatCounter and subsequently gained access to the service’s end users
The problem came to light when visitors navigated to the now compromised websites
which contained the infected scrip, and who’s devices then began covertly
mining bitcoins for the attackers. During the second stage, the attackers proceeded
to steal bitcoins directly from infected devices when they attempted to
access a popular cryptocurrency exchange. To get an idea of the scale of such
an operation, StatCounter can be found on more than two million websites.
Such an attack means that system resources of
infected devices at the company legitimately using the service are additionally
tasked to mine. This may not concern only computers, but also mobile
devices and especially servers. The subsequent cryptomining accelerates wear
and tear on devices and also increases electricity bills. In addition, we
should not forget that malicious cryptomining code is usually capable of uploading
other types of malicious script onto the network.
Investigations may take months and are
looking for a needle in a haystack
When a large company falls victim to such
an attack, it is necessary to carry out a complicated investigation of what
happened and how the company has been affected. Research
shows that it takes about 150-200 days for companies to find out
they’ve been infected. Further investigation regarding the method by which the
company was infected and where the malicious code originated may take even longer.
Facing such substantial risks, large companies should leverage solutions like ESET Dynamic Threat Defense to detect new, never before seen threats.
To find out more about ESET Dynamic Threat Defense or to request a free in-house cyber security training session for your organisation, please sign up below.
Ransomware is by far the biggest threat among Enterprises. So what is Ransomware? It is a malicious code that blocks or encrypts the contents of a device and demands a ransom to restore access to the data.
According to research done by ESET, Companies named ransomware their number one concern.
In response to customer needs and concerns, ESET integrated Ransomware Shield into its security solutions. ESET has long been providing its customers with very good behavior-based malware detection and also with Host-based Intrusion Prevention System (HIPS) that allows users to set custom rules for the protection against ransomware. However, should something slip past the 11 other security layers, Ransomware Shield will be automatically activated.
While ransomware infection often starts with clicking a suspicious link or a fictitious invoice, ESET found that email remains the most common distribution method.
these scenarios, enter ESET Dynamic Threat Defense (EDTD). EDTD provides
another layer of security for ESET products like Mail Security and Endpoint
products. It utilizes a cloud-based sandboxing technology and multiple machine
learning models to detect new, never before seen type of threats. In result,
attachments that were classified as malicious are stripped off the email and
the recipient gets information about the detection.
To learn more about how ESET can protect your business, and to book a FREE in houseCybersecurity Training Session for your employees, please sign up below.