Malware kits, the concern of security experts: what are they?

HP has published its quarterly report, known as HP Wolf Security Threat Insights.

This document shows how the sector of cybercrimine presents a threat that has long been underestimated, but which constitutes an enormous danger for companies and ordinary users. We’re talking about kit malware, pre-packaged tools that allow even less experienced cybercriminals to perpetrate high-level attacks.

He expressed himself in this regard Alex Hollandsenior malware analyst on the threat research team at HP Wolf Security, stating how “Today, threat actors can easily purchase a “meal kit” of pre-packaged, easy-to-use malware that infects systems with just one click. Instead of creating their own tools, low-level cybercriminals can access kits that use tools that live off the market. Ground-based tactics: These in-memory stealth attacks are often harder to detect due to security tool exclusions for administrator use, such as automation“.

Furthermore, according to the information collected by HP, in many cases the kits are used as real bait for the cybercriminali novices who, in turn, become prey to more experienced ones. Not only that: since these tools cost several hundred dollars, many aspiring hackers resort to counterfeit versions, which actually turn out to be malware.

Malware kits and more: HP’s analysis examines vectors and file types at risk

In addition to the malware kit data, HP’s report also highlighted other critical issues.

The paper details how cybercriminals continue to diversify attack methods to bypass detection tools. According to data obtained by HB on the third quarter of last year, the threats they exploit file PDF have increased by 5%with much larger increases in format Excel (91% increase) and documents Word (68%).

Still third quarter of the year, then, in the context of the carriers email confirms itself as the most widespread channel (80%) followed by direct download of files via browser (11% of cases).

Per Alex Holland “While the tools to carry out stealth attacks are readily available, threat actors still rely on the user’s click“. He then elaborated by stating how “To neutralize the risk of pre-packaged malware kits, companies should isolate high-risk activities, such as opening email attachments, clicking links, and downloads. This significantly minimizes the potential for breach by reducing the attack surface“.


Please enter your comment!
Please enter your name here