{"id":6646,"date":"2020-12-01T17:14:25","date_gmt":"2020-12-01T17:14:25","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6646"},"modified":"2021-08-18T12:44:22","modified_gmt":"2021-08-18T11:44:22","slug":"why-security-has-grown-more-complex-2","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2","title":{"rendered":"Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex"},"content":{"rendered":"<p>We often talk about the idea that cybersecurity has become more important than ever. The threats have become more sophisticated, and the damages have grown larger. But we don\u2019t often talk about\u00a0<em>why<\/em>\u00a0threats have become harder to deal with. One of the main reasons? Cybercrime has become big business. Today, we\u2019ll talk about the trend of malware-as-a-service (MaaS), how MaaS affects the threat landscape, and what you can do to fight back.<\/p>\n<h2 class=\"h3\">Malware-as-a-service<\/h2>\n<p>Our Head Security Nerd, Gill Langston, recently\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/us-cert-releases-warning-healthcare-organizations-about-elevated-ransomware-risks\" target=\"_blank\" rel=\"noopener\">published a blog<\/a>\u00a0about the widespread threat to hospitals and healthcare providers based on an alert issued by US-CERT. The threat uses the Ryuk ransomware family, which has been particularly popular over the past year. Gill\u2019s article covers the attack timeline for how Ryuk attacks unfold, and we highly recommend\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/us-cert-releases-warning-healthcare-organizations-about-elevated-ransomware-risks\" target=\"_blank\" rel=\"noopener\">checking out the piece<\/a>\u00a0if you\u2019re interested.<\/p>\n<p>But one of the interesting aspects of Ryuk\u2014and some similar attacks\u2014is they\u2019re sophisticated, yet can be used by people without sophisticated hacking and coding abilities. The developers of Ryuk and similar attacks often do a lot of the serious heavy lifting, then sell access to the malware for a cut of the eventual profits. This lets the malware developers make money and reduce their risk of detection in the process.<\/p>\n<p>This also means people without the means to create their own sophisticated attacks now have access to more powerful cyberweapons. In a way, the developers act as arms dealers, offering powerful\u00a0malware\u00a0or ransomware to a wider cybercriminal community. In short, more people can attack with heavy artillery than would otherwise.<\/p>\n<h2 class=\"h3\">Keeping ahead of the cybercriminals<\/h2>\n<p>However, while this trend certainly is bad news, there\u2019s a lot on your side as an IT consultant or service provider. For starters, you\u2019re not alone in dealing with these issues. So much of cybercrime crosses the boundaries between the corporate and national security worlds that government agencies often release free information to help organizations prevent attacks. As Gill mentioned in his blog, it\u2019s worth getting on the mailing lists for some of these agencies so you\u2019re aware when there\u2019s a potential threat that could directly affect you. For example, you can sign up for US-CERT alerts from the Cybersecurity and Infrastructure Security Agency by\u00a0<a class=\"ext\" href=\"https:\/\/us-cert.cisa.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">going to their site<\/a>, scrolling to the bottom of the page, and subscribing to the alerts.<\/p>\n<p>Additionally, the fact that these attacks are widespread means security vendors innovate frequently to deal with these issues. While the bad guys have their incentives, our industry constantly adapts to changing circumstances and rises to the challenge. MSPs can do the same.<\/p>\n<p>So how do you do your part? When it comes to working with your customers, you want to make sure you\u2019re giving them full, layered security where you can. This includes:<\/p>\n<h3 class=\"h4\">\u2022\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/edr-solutions?promo=blog\" target=\"_blank\" rel=\"noopener\">ENDPOINT DETECTION AND RESPONSE<\/a><\/h3>\n<p>This may be one of the more important suggestions here\u2014endpoint detection and response (EDR) needs to play a central role in your security stack. While some customers may drag their feet and stick with antivirus, shifting them to EDR really is in their best interest to help prevent these sophisticated attacks. EDR solutions can look for anomalies in endpoint behavior that could be deemed suspicious. For example, if something on the endpoint starts mass deleting files, it can flag that, alert your team, or even take action on your behalf. With more sophisticated attacks designed to bypass antivirus, adaptive, AI-driven protection may soon become mandatory. It\u2019s worth strongly recommending EDR in the current threat environment (especially as we can expect this trend to only get worse).<\/p>\n<h3 class=\"h4\">\u2022\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/email-threat-protection?promo=blog\" target=\"_blank\" rel=\"noopener\">EMAIL PROTECTION<\/a><\/h3>\n<p>Email protection also must be part of any layered security approach. A lot of attacks, particularly multistage, sophisticated cyberthreats, often start with an email. Someone opens an email, downloads an attached document, and the attack launches. Because of this, you don\u2019t want to roll the dice by sticking with native email security\u2014adding an additional, dedicated email security product can help you leverage threat intelligence and machine learning to help protect against potential threats.<\/p>\n<h3 class=\"h4\">\u2022\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/backup\/use-cases\/enterprise-cloud-backup?promo=blog\" target=\"_blank\" rel=\"noopener\">CLOUD BACKUP<\/a><\/h3>\n<p>With the ever-present threat of ransomware, you\u2019ll want to have cloud backups off site. Even if you have an EDR solution that can roll back ransomware, you\u2019ll still want cloud backups in in the event of a site loss due to a natural disaster or for insider threats such as mass deletion of files. It always helps to have a backup.<\/p>\n<h3 class=\"h4\">\u2022\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/patch-management-tool-msp?promo=blog\" target=\"_blank\" rel=\"noopener\">PATCHING<\/a><\/h3>\n<p>We mentioned earlier how you\u2019re not alone. Most software vendors work tirelessly to both prevent security flaws and, when they crop up, find and fix them. That\u2019s why it\u2019s crucial to do your own part and patch vulnerabilities when updates come available.<\/p>\n<h2 class=\"h3\">The shady business of cybercrime<\/h2>\n<p>Unfortunately, cybercrime is big business. As long as cybercriminals have strong financial incentives, they\u2019ll continue finding new ways to compromise organizations. However, if you update your security controls to adapt to this new environment, you can substantially reduce your risk.<\/p>\n<p><b>As mentioned in the post, one of the most important tools for dealing with this threat environment is endpoint detection and response. SolarWinds<sup>\u00ae<\/sup>\u00a0Endpoint Detection and Response uses artificial threat intelligence and behavioral analysis to flag and even respond to suspicious endpoint behaviors when they arise. This means that if a new, unseen threat crops up, SolarWinds EDR can alert you even if the wider security community isn\u2019t yet aware of the threat. Learn more about\u00a0<\/b><a href=\"https:\/\/www.solarwindsmsp.com\/products\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\"><b>SolarWinds EDR<\/b><\/a><b>\u00a0today.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the main reasons threats have become harder to deal with is because cybercrime has become big business. We look at the trend of malware-as-a-service and how to fight&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6646","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex - N-able<\/title>\n<meta name=\"description\" content=\"One of the main reasons threats have become harder to deal with is because cybercrime has become big business. We look at the trend of malware-as-a-service and how to fight back.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex - N-able\" \/>\n<meta property=\"og:description\" content=\"One of the main reasons threats have become harder to deal with is because cybercrime has become big business. We look at the trend of malware-as-a-service and how to fight back.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-01T17:14:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-18T11:44:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex\",\"datePublished\":\"2020-12-01T17:14:25+00:00\",\"dateModified\":\"2021-08-18T11:44:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2\"},\"wordCount\":927,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2\",\"name\":\"Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2020-12-01T17:14:25+00:00\",\"dateModified\":\"2021-08-18T11:44:22+00:00\",\"description\":\"One of the main reasons threats have become harder to deal with is because cybercrime has become big business. We look at the trend of malware-as-a-service and how to fight back.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex - N-able","description":"One of the main reasons threats have become harder to deal with is because cybercrime has become big business. We look at the trend of malware-as-a-service and how to fight back.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2","og_locale":"pt_BR","og_type":"article","og_title":"Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex - N-able","og_description":"One of the main reasons threats have become harder to deal with is because cybercrime has become big business. We look at the trend of malware-as-a-service and how to fight back.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-12-01T17:14:25+00:00","article_modified_time":"2021-08-18T11:44:22+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex","datePublished":"2020-12-01T17:14:25+00:00","dateModified":"2021-08-18T11:44:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2"},"wordCount":927,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2","url":"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2","name":"Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2020-12-01T17:14:25+00:00","dateModified":"2021-08-18T11:44:22+00:00","description":"One of the main reasons threats have become harder to deal with is because cybercrime has become big business. We look at the trend of malware-as-a-service and how to fight back.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-security-has-grown-more-complex-2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Malware-as-a-Service: A Crucial Reason Why Security Has Grown More Complex"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=6646"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6646\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=6646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}