{"id":6960,"date":"2018-12-09T23:57:47","date_gmt":"2018-12-09T15:57:47","guid":{"rendered":"http:\/\/nxtmag.tech\/?p=6960"},"modified":"2019-03-19T08:39:57","modified_gmt":"2019-03-19T00:39:57","slug":"under-the-radar-the-future-of-undetected-malware-in-apac","status":"publish","type":"post","link":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/","title":{"rendered":"Under the Radar: The Future of Undetected Malware in APAC"},"content":{"rendered":"<p>The threat landscape is changing is always changing, and usually for the worst. The new malware we see being developed and deployed in the wild have new features and techniques that allow them to go beyond what they were originally able to do, either for the focus on additional infection or evasion of detection. Let&#8217;s take a look at these undetected malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6961\" src=\"http:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1.jpg\" alt=\"Woman using computer\" width=\"900\" height=\"600\" srcset=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1.jpg 900w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1-300x200.jpg 300w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1-768x512.jpg 768w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1-696x464.jpg 696w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1-630x420.jpg 630w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<h3><strong>Under the Radar Malware: \u2018Invisible\u2019 Infections<\/strong><\/h3>\n<p>Malware authors have been incorporating new infection methods that have resulted in a whole new category of attacks: under the radar malware. This is a difficult-to-remediate group of threats that is growing in sophistication and frequency, a cause for concern for businesses today and in the future, according to a new research report from Malwarebytes.<\/p>\n<p>The under the radar malware harms our laptops silently until it is too late to remediate. We won\u2019t even realize that we are being attacked because this modern malware is designed to avoid detection and maintain persistence.<\/p>\n<h3><strong>The Future of Attacks in ASEAN<\/strong><\/h3>\n<p>Analysing the latest data in fileless attack methodology, frequency, remediation resistance and adaptive attacks, we found that Emotet, Sorebrect ransomware, SamSam and TrickBot represent the future of attacks.<\/p>\n<p>For example, when looking at Emotet, a banking trojan malware program that uses the same vulnerabilities that WannaCry and NotPetya exploited, Philippines is the most infected country in APAC, with nearly 60,000 instances detected by Malwarebytes. Sorebrect, a fileless ransomware infection that targets network shares, has been heavily detected in Southeast Asia as well, especially in Indonesia, Thailand and the Philippines.<\/p>\n<p>The region is also seeing more exploit kit activity than any other part of the world right now, since so many users in these countries use outdated operating systems and browsers, that make them easy to attack with old exploits. If Sorebrect is distributed through one of these exploit kits, the victim would likely have no idea they were infected until it was far too late and it would require almost no interaction by the victim, other than visiting a website.<\/p>\n<h3><strong>Fighting Cybercrime in 2019<\/strong><\/h3>\n<p>To be able to fight cybercrime in the future, security solutions will need to include modern features that are effective against these new threats:<\/p>\n<ul>\n<li>Behavioral detection that is dynamic and able to learn from the threats. The future of fighting cybercrime lies in being able to detect threats because they act like threats, not necessarily because you recognize them as such.<\/li>\n<li>Blocking at Delivery. A powerful \u2018bouncer\u2019 that keeps all the endpoints safe.<\/li>\n<li>Self-Defense Modes. More and more we see attacks that attempt to shut down security tools that may be used to detect and remove whatever additional payload the threat intends to infect the system with.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The threat landscape is changing is always changing, and usually for the worst. The new malware we see being developed and deployed in the wild have new features and techniques that allow them to go beyond what they were originally able to do, either for the focus on additional infection or evasion of detection. Let&#8217;s [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6961,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[19,523],"tags":[],"class_list":{"0":"post-6960","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-guru"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Under the Radar: The Future of Undetected Malware in APAC - NXT Malaysia<\/title>\n<meta name=\"description\" content=\"The threat landscape is changing is always changing, and usually for the worst. New undetected malware are being developed and deployed in the wild.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:locale:alternate\" content=\"en_SG\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Under the Radar: The Future of Undetected Malware in APAC - NXT Malaysia\" \/>\n<meta property=\"og:description\" content=\"The threat landscape is changing is always changing, and usually for the worst. New undetected malware are being developed and deployed in the wild.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/\" \/>\n<meta property=\"og:site_name\" content=\"NXT Malaysia\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-09T15:57:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-19T00:39:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NXT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NXT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/\"},\"author\":{\"name\":\"NXT\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\"},\"headline\":\"Under the Radar: The Future of Undetected Malware in APAC\",\"datePublished\":\"2018-12-09T15:57:47+00:00\",\"dateModified\":\"2019-03-19T00:39:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/\"},\"wordCount\":457,\"image\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/undetected-malware-1.jpg\",\"articleSection\":[\"News\",\"Guru\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/\",\"name\":\"Under the Radar: The Future of Undetected Malware in APAC - NXT Malaysia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/undetected-malware-1.jpg\",\"datePublished\":\"2018-12-09T15:57:47+00:00\",\"dateModified\":\"2019-03-19T00:39:57+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\"},\"description\":\"The threat landscape is changing is always changing, and usually for the worst. New undetected malware are being developed and deployed in the wild.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/undetected-malware-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/undetected-malware-1.jpg\",\"width\":900,\"height\":600,\"caption\":\"Woman using computer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2018\\\/12\\\/09\\\/under-the-radar-the-future-of-undetected-malware-in-apac\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nxtmag.tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Under the Radar: The Future of Undetected Malware in APAC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#website\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/\",\"name\":\"NXT Malaysia\",\"description\":\"Gear, Gadget, Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\",\"name\":\"NXT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"caption\":\"NXT\"},\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/author\\\/lawrence\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Under the Radar: The Future of Undetected Malware in APAC - NXT Malaysia","description":"The threat landscape is changing is always changing, and usually for the worst. New undetected malware are being developed and deployed in the wild.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/","og_locale":"en_US","og_type":"article","og_title":"Under the Radar: The Future of Undetected Malware in APAC - NXT Malaysia","og_description":"The threat landscape is changing is always changing, and usually for the worst. New undetected malware are being developed and deployed in the wild.","og_url":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/","og_site_name":"NXT Malaysia","article_published_time":"2018-12-09T15:57:47+00:00","article_modified_time":"2019-03-19T00:39:57+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1.jpg","type":"image\/jpeg"}],"author":"NXT","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NXT","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/#article","isPartOf":{"@id":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/"},"author":{"name":"NXT","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852"},"headline":"Under the Radar: The Future of Undetected Malware in APAC","datePublished":"2018-12-09T15:57:47+00:00","dateModified":"2019-03-19T00:39:57+00:00","mainEntityOfPage":{"@id":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/"},"wordCount":457,"image":{"@id":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/#primaryimage"},"thumbnailUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1.jpg","articleSection":["News","Guru"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/","url":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/","name":"Under the Radar: The Future of Undetected Malware in APAC - NXT Malaysia","isPartOf":{"@id":"https:\/\/nxtmag.tech\/my\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/#primaryimage"},"image":{"@id":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/#primaryimage"},"thumbnailUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1.jpg","datePublished":"2018-12-09T15:57:47+00:00","dateModified":"2019-03-19T00:39:57+00:00","author":{"@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852"},"description":"The threat landscape is changing is always changing, and usually for the worst. New undetected malware are being developed and deployed in the wild.","breadcrumb":{"@id":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/#primaryimage","url":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1.jpg","contentUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2018\/12\/undetected-malware-1.jpg","width":900,"height":600,"caption":"Woman using computer"},{"@type":"BreadcrumbList","@id":"https:\/\/nxtmag.tech\/my\/2018\/12\/09\/under-the-radar-the-future-of-undetected-malware-in-apac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nxtmag.tech\/"},{"@type":"ListItem","position":2,"name":"Under the Radar: The Future of Undetected Malware in APAC"}]},{"@type":"WebSite","@id":"https:\/\/nxtmag.tech\/my\/#website","url":"https:\/\/nxtmag.tech\/my\/","name":"NXT Malaysia","description":"Gear, Gadget, Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nxtmag.tech\/my\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852","name":"NXT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","caption":"NXT"},"url":"https:\/\/nxtmag.tech\/my\/author\/lawrence\/"}]}},"_links":{"self":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/6960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/comments?post=6960"}],"version-history":[{"count":1,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/6960\/revisions"}],"predecessor-version":[{"id":6962,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/6960\/revisions\/6962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/media\/6961"}],"wp:attachment":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/media?parent=6960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/categories?post=6960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/tags?post=6960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}