{"id":16149,"date":"2023-06-28T21:18:08","date_gmt":"2023-06-28T21:18:08","guid":{"rendered":"https:\/\/khaleej-trend.online\/eng\/?p=16149"},"modified":"2023-06-28T21:18:08","modified_gmt":"2023-06-28T21:18:08","slug":"massive-new-waves-of-malware-techdoctorhere","status":"publish","type":"post","link":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/","title":{"rendered":"Massive new waves of malware techdoctorhere"},"content":{"rendered":"<div id=\"khale-1153475717\" class=\"khale-- khale-entity-placement\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><div id=\"khale-3198754858\" class=\"khale-before-content khale-entity-placement\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><p><span style=\"vertical-align: inherit;\"><a href=\"https:\/\/khaleej-trend.online\/eng\/\">Kworld Trend<\/a> \/ Massive new waves of malware techdoctorhere, Organizations around the world are in the midst of a massive wave of ransomware attacks. In the past three months alone, the daily rate of ransomware attacks has increased by 50%. <\/span><\/p><div id=\"khale-3590835371\" class=\"khale-- khale-entity-placement\" style=\"margin-left: auto;margin-right: auto;text-align: center;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<p><span style=\"vertical-align: inherit;\">As these attacks continue to grow in frequency and severity, their impact on business has grown exponentially. Last month, there were reports of ransomware attacks targeting the shipping giant, a US-based broker, and one of the world&#8217;s largest watchmakers.<\/span><\/p>\n<h2><span style=\"vertical-align: inherit;\">Massive new waves of malware techdoctorhere<\/span><\/h2>\n<p><span style=\"vertical-align: inherit;\">Malware is one of the biggest security threats organizations face. Malware attacks increased 358% in 2020 compared to 2019, and ransomware attacks increased 435% year-over-year, according to Deep Instinct. 2021 is set to be more of the same. The first half of the year saw\u00a0 <\/span><span style=\"vertical-align: inherit;\">a 93% increase in ransomware attacks <\/span><span style=\"vertical-align: inherit;\">\u00a0compared to the same period in 2020, according to Check Point&#8217;s mid-year security report.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Security departments must actively monitor networks to catch and contain malware before it can do serious damage. However, with malware, prevention is key. But to prevent an attack from occurring, it is essential that you first understand what malware is, along with the 10 most common types of malware.<\/span><\/p>\n<section class=\"section main-article-chapter\" data-menu-title=\"What is malware?\">\n<h3 class=\"section-title\"><span style=\"vertical-align: inherit;\">What is malware?<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">Malware <\/span><span style=\"vertical-align: inherit;\">, short for malware, is used by threat actors to intentionally damage and infect devices and networks. The blanket term includes many subcategories, including the following:<\/span><\/p>\n<ol class=\"default-list\">\n<li><span style=\"vertical-align: inherit;\">viruses<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">worms<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">ransomware<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">bots<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Trojan horses<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">keyloggers<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Rootkit<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Spying programs<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">crypto malware<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">periodic<\/span><\/li>\n<\/ol>\n<p><span style=\"vertical-align: inherit;\">Malware infiltrates systems physically, via email or over the Internet.\u00a0<\/span><span style=\"vertical-align: inherit;\">Phishing <\/span><span style=\"vertical-align: inherit;\">, which includes an email that appears legitimate but contains malicious links or attachments, is one of the most common malware attack vectors. Malware can also access devices and networks via infected USB drives, unpatched or fraudulent software and applications, insider threats, and weak or faulty hardware and software.<\/span><\/p>\n<section class=\"section main-article-chapter\" data-menu-title=\"What is malware?\"><span style=\"vertical-align: inherit;\">Malware can remain undetected for long periods of time. Many users are only aware of a malware attack if they receive an anti-malware alert, see pop-up ads, are redirected to malicious websites, or experience slow computer speeds or frequent crashes.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Malware exploits devices to benefit the threat actors. Attackers use malware to steal data and credentials, spy on users, hold devices hostage, corrupt files, and more.<\/span><\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"What are the different types of malware?\">\n<h3 class=\"section-title\"><span style=\"vertical-align: inherit;\">What are the different types of malware?<\/span><\/h3>\n<h4><span style=\"vertical-align: inherit;\">1. Viruses<\/span><\/h4>\n<p><span style=\"vertical-align: inherit;\">A computer <\/span><span style=\"vertical-align: inherit;\">virus infects\u00a0 <\/span><span style=\"vertical-align: inherit;\">\u00a0devices and replicates itself across systems. Viruses require human intervention to spread. Once users download the malicious code onto their devices &#8211; often delivered via malicious ads or phishing emails &#8211; the virus spreads throughout their systems. Viruses can modify computer functions and applications; copy, delete and steal data; data encryption to carry out ransomware attacks; and perform DDoS attacks.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">The Zeus virus, which was first detected in 2006, is still used by threat actors today. Attackers use it to create botnets and as a banking Trojan to steal victims&#8217; financial data. The creators of Zeus released the\u00a0 <\/span><span style=\"vertical-align: inherit;\">malware&#8217;s source code in 2011 <\/span><span style=\"vertical-align: inherit;\">, enabling new actors to create updated, more menacing versions of the original virus.<\/span><\/p>\n<h4><span style=\"vertical-align: inherit;\">2. A worm<\/span><\/h4>\n<p><span style=\"vertical-align: inherit;\">The computer worm self -replicates\u00a0 <\/span><span style=\"vertical-align: inherit;\">\u00a0and infects other computers without human intervention. This malware inserts itself into devices via vulnerabilities, malicious links or files. Once inside, the worms look for networked devices to attack. Worms often go unnoticed by users, usually disguised as legitimate working files.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">WannaCry <\/span><span style=\"vertical-align: inherit;\">, also a form of ransomware, is one of the most notorious worm attacks. The malware took advantage of the EternalBlue vulnerability in older versions of the Windows Server Message Block protocol. In its first year, the worm spread\u00a0 <\/span><span style=\"vertical-align: inherit;\">to 150 countries <\/span><span style=\"vertical-align: inherit;\">. The following year, it infected\u00a0 <\/span><span style=\"vertical-align: inherit;\">nearly 5 million devices <\/span><span style=\"vertical-align: inherit;\">.<\/span><\/p>\n<h4><span style=\"vertical-align: inherit;\">3. Ransomware<\/span><\/h4>\n<p><span style=\"vertical-align: inherit;\">Ransomware <\/span><span style=\"vertical-align: inherit;\">\u00a0encrypts files or devices and forces victims to pay a ransom for re-entry. <\/span><span style=\"vertical-align: inherit;\">While ransomware and malware <\/span><span style=\"vertical-align: inherit;\">are often used <\/span><span style=\"vertical-align: inherit;\">\u00a0synonymously, ransomware is a specific form of malware.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">There are\u00a0 <\/span><span style=\"vertical-align: inherit;\">four main types <\/span><span style=\"vertical-align: inherit;\">\u00a0of ransomware:<\/span><\/p>\n<ol class=\"default-list\">\n<li><strong><span style=\"vertical-align: inherit;\">Locker ransomware\u00a0<\/span><\/strong><span style=\"vertical-align: inherit;\"> completely locks users out of their devices.<\/span><\/li>\n<li><strong><span style=\"vertical-align: inherit;\">Crypto ransomware\u00a0<\/span><\/strong><span style=\"vertical-align: inherit;\"> encrypts all or some of the files on the device.<\/span><\/li>\n<li><strong><span style=\"vertical-align: inherit;\">Double extortion ransomware\u00a0<\/span><\/strong><span style=\"vertical-align: inherit;\"> encrypts and exports users&#8217; files. In this way, attackers can extract ransom payments and\/or sell stolen data.<\/span><\/li>\n<li><strong><span style=\"vertical-align: inherit;\">Ransomware as a Service enables<\/span><\/strong><span style=\"vertical-align: inherit;\"> \u00a0affiliates or customers to rent ransomware. A percentage of each ransom is paid to the ransomware developer.<\/span><\/li>\n<\/ol>\n<p><span style=\"vertical-align: inherit;\">Known ransomware variants include REvil, WannaCry, and DarkSide, the strain used in\u00a0 <\/span><span style=\"vertical-align: inherit;\">the Colonial Pipeline attack <\/span><span style=\"vertical-align: inherit;\">.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Data backups have always been the first defense against ransomware &#8211; with a proper backup, victims can restore their files from a known good version. As extortionists emerge, organizations must take other measures to protect\u00a0 <\/span><span style=\"vertical-align: inherit;\">their assets from ransomware <\/span><span style=\"vertical-align: inherit;\">, such as deploying advanced protection technologies and using anti-malware with anti-ransomware features. Massive new waves of malware techdoctorhere<\/span><\/p>\n<h4><span style=\"vertical-align: inherit;\">4. Robots<\/span><\/h4>\n<p><span style=\"vertical-align: inherit;\">A bot\u00a0 \u00a0is a self-replicating malware that spreads itself to other devices, creating a network of bots\u00a0 <\/span><span style=\"vertical-align: inherit;\">or <em>botnets<\/em> . Once infected, the devices perform automated tasks ordered by the attacker. Botnets are often used in DDoS attacks. They can also perform keyboard recording and send phishing emails.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Mirai is a classic example of a bot. This malware, which launched a massive DDoS attack in 2016, continues\u00a0 <\/span><span style=\"vertical-align: inherit;\">to target the Internet of Things and other devices <\/span><span style=\"vertical-align: inherit;\">\u00a0today. Research also shows\u00a0 <\/span><span style=\"vertical-align: inherit;\">a botnet boom during the COVID-19 pandemic <\/span><span style=\"vertical-align: inherit;\">. Infected consumer devices\u2014common targets for Mirai and other botnets\u2014that employees use for work or on networks of employees working on company-owned devices from home enable malware to spread to company systems.<\/span><\/p>\n<h4><span style=\"vertical-align: inherit;\">5. Trojan horses<\/span><\/h4>\n<p><span style=\"vertical-align: inherit;\">A Trojan <\/span><span style=\"vertical-align: inherit;\">horse\u00a0 <\/span><span style=\"vertical-align: inherit;\">\u00a0is malicious software that appears legitimate to users. Trojans rely on social engineering techniques to invade devices. <\/span><span style=\"vertical-align: inherit;\">Once inside the device, the Trojan horse payload &#8211; or malicious code &#8211; <\/span><span style=\"vertical-align: inherit;\">is installed <\/span><span style=\"vertical-align: inherit;\">\u00a0which is responsible for facilitating the exploit. Trojans give attackers backdoor access to a device, perform keyboard typing, install viruses or worms, and steal data.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Remote-access Trojans (RATs) enable attackers to take control of an infected machine. Once in, attackers can use the infected device to infect other devices with RAT and create a botnet.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">The Emotet banking Trojan <\/span><span style=\"vertical-align: inherit;\">was first discovered\u00a0 <\/span><span style=\"vertical-align: inherit;\">\u00a0in 2014. Despite a global removal at the beginning of 2021,\u00a0 <\/span><span style=\"vertical-align: inherit;\">Emotet has been rebuilt <\/span><span style=\"vertical-align: inherit;\">\u00a0and still helps threat actors steal victims&#8217; financial information. Massive new waves of malware techdoctorhere<\/span><\/p>\n<h4><span style=\"vertical-align: inherit;\">6. kilologs<\/span><\/h4>\n<p><span style=\"vertical-align: inherit;\">A keylogger <\/span><span style=\"vertical-align: inherit;\">is\u00a0 <\/span><span style=\"vertical-align: inherit;\">\u00a0a surveillance malware that monitors keystroke patterns. Threats use keyloggers to obtain victims&#8217; usernames, passwords, and other sensitive data.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Keyloggers can be hardware or software. Keyloggers are manually installed into keyboards. After the victim uses the keyboard, the attacker must physically retrieve the device. On the other hand, keyloggers do not require physical access. They are often downloaded by the victim via malicious links or downloads. Keyloggers log keystrokes and upload the data to the attacker.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Agent Tesla keylogger first appeared in 2014.\u00a0 <\/span><span style=\"vertical-align: inherit;\">The RAT spyware continues to plague users <\/span><span style=\"vertical-align: inherit;\">, with its latest version not only logging keystrokes but also taking screenshots of victims&#8217; devices.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Password managers are particularly useful <\/span><span style=\"vertical-align: inherit;\">\u00a0in preventing keylogger attacks because users do not need to physically fill in their usernames and passwords, thus preventing them from being registered by keyloggers.<\/span><\/p>\n<h4><span style=\"vertical-align: inherit;\">7. Rootkit<\/span><\/h4>\n<p><span style=\"vertical-align: inherit;\">A <\/span><span style=\"vertical-align: inherit;\">rootkit\u00a0 <\/span><span style=\"vertical-align: inherit;\">\u00a0is malicious software that enables threat actors to gain remote access to and control a device. Root tools facilitate the spread of other types of malware, including ransomware, viruses, and keyloggers.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Rootkits often go undetected because, once in a device, they can deactivate anti-malware and anti-virus software on the endpoint. Rootkits usually enter\u00a0 <\/span><span style=\"vertical-align: inherit;\">devices and systems through phishing emails <\/span><span style=\"vertical-align: inherit;\">\u00a0and malicious attachments.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">To detect rootkit attacks, cybersecurity teams must analyze network behavior. Set alerts if, for example, a user who routinely logs in at the same time and at the same location each day suddenly logs in at a different time or location.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">The first rootkit, NTRootkit, appeared in 1999. Hacker Defender, one of the most\u00a0 <\/span><span style=\"vertical-align: inherit;\">popular rootkit suites <\/span><span style=\"vertical-align: inherit;\">\u00a0of the 2000s, was released in 2003.<\/span><\/p>\n<h4><span style=\"vertical-align: inherit;\">8. Spyware<\/span><\/h4>\n<p><span style=\"vertical-align: inherit;\">Spyware <\/span><span style=\"vertical-align: inherit;\">\u00a0is malicious software that is downloaded to a device without the user&#8217;s permission. It steals users&#8217; data to sell it to advertisers and external users. Spyware can track credentials, obtain banking details, and other sensitive data. It infects devices through malicious apps, links, websites, and email attachments. Mobile spyware, which can be disseminated via SMS and MMS, is particularly harmful because it tracks the user&#8217;s location and has access to the device&#8217;s camera and microphone. Adware, keyloggers, Trojans, and mobile spyware are all forms of spyware.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Pegasus is a mobile spyware that targets iOS and Android devices. It was first discovered in 2016, at which time it was linked to Israeli tech company NSO Group. Apple sued\u00a0 <\/span><span style=\"vertical-align: inherit;\">the <\/span><span style=\"vertical-align: inherit;\">\u00a0seller in November 2021 for attacking Apple customers and products. <\/span><span style=\"vertical-align: inherit;\">Pegasus was <\/span><span style=\"vertical-align: inherit;\">also\u00a0 linked to the assassination of <\/span><span style=\"vertical-align: inherit;\">\u00a0Saudi journalist Jamal Khashoggi in 2018. Massive new waves of malware techdoctorhere<\/span><\/p>\n<h4><span style=\"vertical-align: inherit;\">9. Cryptographic malware<\/span><\/h4>\n<p><span style=\"vertical-align: inherit;\">Mining &#8211; the process of verifying transactions within a blockchain &#8211; is highly profitable but requires massive processing power. Miners are rewarded for every transaction they validate.\u00a0<\/span><span style=\"vertical-align: inherit;\">Cryptojacking <\/span><span style=\"vertical-align: inherit;\">, the procedure behind cryptographic malware, enables threat actors to use the resources of an infected device to perform verification.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Cisco found that\u00a0 <\/span><span style=\"vertical-align: inherit;\">69% of its customers <\/span><span style=\"vertical-align: inherit;\">\u00a0were affected by cryptographic malware in 2020, representing the largest category of DNS traffic to malicious sites that year.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">XMRig was\u00a0 <\/span><span style=\"vertical-align: inherit;\">the most popular malware <\/span><span style=\"vertical-align: inherit;\">\u00a0in 2020, followed by JSEcoin, Lucifer, WannaMine, and RubyMiner.<\/span><\/p>\n<h4><span style=\"vertical-align: inherit;\">10. Periodical<\/span><\/h4>\n<p><span style=\"vertical-align: inherit;\">Adware <\/span><span style=\"vertical-align: inherit;\">\u00a0is software that displays or downloads unwanted advertisements, usually in the form of banners or pop-ups. It collects web browser history and cookies to target users with specific ads.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Not all adware is harmful. Software developers use legitimate advertising software &#8211; with users&#8217; consent &#8211; to reimburse the developer&#8217;s costs. However, malicious adware can display ads that may lead to infection when clicked.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Attackers use vulnerabilities to infect operating systems and to place malicious adware inside pre-existing applications. Users may also download already corrupted applications with adware. Alternately, adware can be included in a software package when you download a legitimate application or be pre-installed on a device, also known as bloatware.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Fireball, Gator, DollarRevenue, and OpenSUpdater are examples of adware.<\/span><\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"How to prevent malware attacks\">\n<h3 class=\"section-title\"><span style=\"vertical-align: inherit;\">How to prevent malware attacks<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">A strong cyber security clean is <\/span><span style=\"vertical-align: inherit;\">\u00a0the best defense against common types of malware attacks. The hypothesis of cyber hygiene is similar to personal hygiene: if an organization maintains a high level of health (security), it avoids contracting disease (attacking it).<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Good eHealth practices that prevent malware attacks include:<\/span><\/p>\n<ul class=\"default-list\">\n<li><span style=\"vertical-align: inherit;\">Software patching and updating.<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Use firewalls and security software, such as anti-malware and anti-virus software.<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Follow\u00a0 <\/span><span style=\"vertical-align: inherit;\">email best practices <\/span><span style=\"vertical-align: inherit;\">.<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Deploy\u00a0 <\/span><span style=\"vertical-align: inherit;\">email security gates <\/span><span style=\"vertical-align: inherit;\">.<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Avoid links and attachments.<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Implementation of access control.<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Multi-factor authentication <\/span><span style=\"vertical-align: inherit;\">required\u00a0 <\/span><span style=\"vertical-align: inherit;\">.<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Use\u00a0 <\/span><span style=\"vertical-align: inherit;\">the principle of least privilege <\/span><span style=\"vertical-align: inherit;\">.<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Monitor for abnormal or suspicious activity.<\/span><\/li>\n<li><span style=\"vertical-align: inherit;\">Conduct regular security awareness training <\/span><span style=\"vertical-align: inherit;\">\u00a0to teach employees about the dangers of different types of malware and urge them to be careful when clicking links and downloading files. Massive new waves of malware techdoctorhere<\/span><\/li>\n<\/ul>\n<\/section>\n<\/section>\n<div id=\"khale-1807632752\" class=\"khale-after-content khale-entity-placement\"><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-format=\"autorelaxed\"\r\n     data-ad-client=\"ca-pub-9610686647069611\"\r\n     data-ad-slot=\"3780750108\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><\/div>","protected":false},"excerpt":{"rendered":"<p>Kworld Trend \/ Massive new waves of malware techdoctorhere, Organizations around the world are in the midst of a massive wave of ransomware attacks. In the past three months alone, the daily rate of ransomware attacks has increased by 50%. As these attacks continue to grow in frequency and severity, their impact on business has &hellip;<\/p>\n","protected":false},"author":14,"featured_media":16150,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[14329,14328,14327],"class_list":["post-16149","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-massive-new-waves","tag-massive-new-waves-of-malware","tag-massive-new-waves-of-malware-techdoctorhere"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Massive new waves of malware techdoctorhere - kworld trend<\/title>\n<meta name=\"description\" content=\"Massive new waves of malware techdoctorhere , Organizations around the world are in the midst of a massive wave of ransomware attacks ...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Massive new waves of malware techdoctorhere - kworld trend\" \/>\n<meta property=\"og:description\" content=\"Massive new waves of malware techdoctorhere , Organizations around the world are in the midst of a massive wave of ransomware attacks ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/\" \/>\n<meta property=\"og:site_name\" content=\"kworld trend\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-28T21:18:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/06\/Massive-new-waves-of-malware-techdoctorhere.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"721\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"fady2023\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"fady2023\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/\"},\"author\":{\"name\":\"fady2023\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/7df2c315ab850ba5562fc3f2c7488bfa\"},\"headline\":\"Massive new waves of malware techdoctorhere\",\"datePublished\":\"2023-06-28T21:18:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/\"},\"wordCount\":1768,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\"},\"image\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Massive-new-waves-of-malware-techdoctorhere.jpg\",\"keywords\":[\"Massive new waves\",\"Massive new waves of malware\",\"Massive new waves of malware techdoctorhere\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/\",\"name\":\"Massive new waves of malware techdoctorhere - kworld trend\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Massive-new-waves-of-malware-techdoctorhere.jpg\",\"datePublished\":\"2023-06-28T21:18:08+00:00\",\"description\":\"Massive new waves of malware techdoctorhere , Organizations around the world are in the midst of a massive wave of ransomware attacks ...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/#primaryimage\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Massive-new-waves-of-malware-techdoctorhere.jpg\",\"contentUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Massive-new-waves-of-malware-techdoctorhere.jpg\",\"width\":1200,\"height\":721,\"caption\":\"Massive new waves of malware techdoctorhere\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/massive-new-waves-of-malware-techdoctorhere\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Massive new waves of malware techdoctorhere\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#website\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/\",\"name\":\"kworld trend\",\"description\":\"site care about apps and trends\",\"publisher\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\",\"name\":\"hasadwan2020\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"contentUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"width\":512,\"height\":512,\"caption\":\"hasadwan2020\"},\"logo\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\"},\"sameAs\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/7df2c315ab850ba5562fc3f2c7488bfa\",\"name\":\"fady2023\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g\",\"caption\":\"fady2023\"},\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/author\\\/fady2023\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Massive new waves of malware techdoctorhere - kworld trend","description":"Massive new waves of malware techdoctorhere , Organizations around the world are in the midst of a massive wave of ransomware attacks ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/","og_locale":"en_US","og_type":"article","og_title":"Massive new waves of malware techdoctorhere - kworld trend","og_description":"Massive new waves of malware techdoctorhere , Organizations around the world are in the midst of a massive wave of ransomware attacks ...","og_url":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/","og_site_name":"kworld trend","article_published_time":"2023-06-28T21:18:08+00:00","og_image":[{"width":1200,"height":721,"url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/06\/Massive-new-waves-of-malware-techdoctorhere.jpg","type":"image\/jpeg"}],"author":"fady2023","twitter_card":"summary_large_image","twitter_misc":{"Written by":"fady2023","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/#article","isPartOf":{"@id":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/"},"author":{"name":"fady2023","@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/7df2c315ab850ba5562fc3f2c7488bfa"},"headline":"Massive new waves of malware techdoctorhere","datePublished":"2023-06-28T21:18:08+00:00","mainEntityOfPage":{"@id":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/"},"wordCount":1768,"commentCount":0,"publisher":{"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c"},"image":{"@id":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/#primaryimage"},"thumbnailUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/06\/Massive-new-waves-of-malware-techdoctorhere.jpg","keywords":["Massive new waves","Massive new waves of malware","Massive new waves of malware techdoctorhere"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/","url":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/","name":"Massive new waves of malware techdoctorhere - kworld trend","isPartOf":{"@id":"https:\/\/khaleej-trend.online\/eng\/#website"},"primaryImageOfPage":{"@id":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/#primaryimage"},"image":{"@id":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/#primaryimage"},"thumbnailUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/06\/Massive-new-waves-of-malware-techdoctorhere.jpg","datePublished":"2023-06-28T21:18:08+00:00","description":"Massive new waves of malware techdoctorhere , Organizations around the world are in the midst of a massive wave of ransomware attacks ...","breadcrumb":{"@id":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/#primaryimage","url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/06\/Massive-new-waves-of-malware-techdoctorhere.jpg","contentUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/06\/Massive-new-waves-of-malware-techdoctorhere.jpg","width":1200,"height":721,"caption":"Massive new waves of malware techdoctorhere"},{"@type":"BreadcrumbList","@id":"https:\/\/khaleej-trend.online\/eng\/massive-new-waves-of-malware-techdoctorhere\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/khaleej-trend.online\/eng\/"},{"@type":"ListItem","position":2,"name":"Massive new waves of malware techdoctorhere"}]},{"@type":"WebSite","@id":"https:\/\/khaleej-trend.online\/eng\/#website","url":"https:\/\/khaleej-trend.online\/eng\/","name":"kworld trend","description":"site care about apps and trends","publisher":{"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/khaleej-trend.online\/eng\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c","name":"hasadwan2020","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","contentUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","width":512,"height":512,"caption":"hasadwan2020"},"logo":{"@id":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg"},"sameAs":["https:\/\/khaleej-trend.online\/eng"]},{"@type":"Person","@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/7df2c315ab850ba5562fc3f2c7488bfa","name":"fady2023","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g","caption":"fady2023"},"url":"https:\/\/khaleej-trend.online\/eng\/author\/fady2023\/"}]}},"_links":{"self":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/16149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/comments?post=16149"}],"version-history":[{"count":2,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/16149\/revisions"}],"predecessor-version":[{"id":16152,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/16149\/revisions\/16152"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/media\/16150"}],"wp:attachment":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/media?parent=16149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/categories?post=16149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/tags?post=16149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}