Bad Actors Still Targeting Remote Workers (Link)

Illustration of a person wearing a mask and holding a crowbar, attempting to break into an office through a window. Inside the office are shelves of books, a desk, a computer, and chairs.

Aamir Lakhani, a global security strategist, and researcher at Fortinet’s FortiGuard Labs, has shared an article on ThreatPost where he discusses the current cybersecurity problems facing remote workers and what can be done to alleviate pain.

You can read the story here (https://threatpost.com/bad-actors-remote-everything/179458/) but we’ve collected highlights from the piece below.

Highlights:

  • Browser-based malware is on the rise
  • The most used distribution mechanisms are:
    • Microsoft Office executables (MS Excel/MS Office, etc)
    • PDF files
    • Browser Scripts
  • Exploit kits and remote access tools (RATs) are almost as popular as Malware with bad actors
  • Attackers are using publicly available exploit kits and reinventing them in brand new ways
  • Working from home means fewer layers of security and bad actors know it
  • FortiGuared recommends Endpoint Detection and Response platforms and Zero-Trust Access as base level security measures for remote workers

The post goes into a bit more depth and is worth reading on it’s own.