Multi-layered is the way to fight Cerber threats: Trend Micro

The Cerber family of ransomware has adopted a new technique to make itself harder to detect, using a new loader that is designed to evade detection by machine learning solutions.

Must Read

Why cybersecurity threats have increased during Covid-19 pandemic

Cybersecurity industry has never had more significant task to carry out than guarding strategic associations and businesses from digital assaults during the coronavirus pandemic

How to choose an effective DDoS mitigation plan

There are several flavours from which to choose when selecting an effective DDoS mitigation strategy. Most enterprises opt for one of the cloud protection flavours (always-on or on-demand)

Ensuring brand protection against cyber attacks

Companies across all industries and sizes must make sure that they are protected and safeguarded against all forms of cyberattacks today

Global firm Trend Micro said that multi-layered approach of cybersecurity will help enterprises and government fight against the new variants of Cerber threats, which is causing disruption across the gateway, endpoints, networks, and servers.

According to reports, the Cerber family of has adopted a new technique to make itself harder to detect, using a new loader that is designed to evade detection by machine learning solutions.

The Tokyo headquartered anti-virus firm said that Ransomware typically arrives via email, and the new Cerber variants are no exception. “Emails that claim to be from various utilities may contain a link to a self-extracting archive, which has been uploaded to a Dropbox account, controlled by the attackers. When the target downloads and opens it, the system gets infected,” said Trend Micro.

Experts are of the view that new packaging and loading mechanism employed by Cerber can cause problems for static machine learning approaches. “Self-extracting and simple straightforward files could pose a problem for static machine learning file detection. All self-extracting files may look similar by structure, regardless of the content. The way Cerber is packaged is said to be designed to evade machine learning file detection,” said Trend Micro.

“For every new detection technique, an equivalent evasion technique is created out of necessity. This new evasion technique does not defeat an anti- approach that uses multiple layers of protection. However, Cerber has its weaknesses against other techniques,” claimed Trend Micro.

“Cyber-criminals will always devise a way to overcome the latest security solutions, users should avoid relying on any single approach to security,” said Nilesh Jain, Country Manager (India and SAARC), Trend Micro.

Subscribe to receive the day's headlines from Tech Observer straight in your inbox

Leave a Reply

*The moderation of comments is automated and not cleared manually by techobserver.in. Embedding of any link and use of abusive or unparliamentary language are prohibited.
- Advertisement -

Latest in TECH

Related Articles