GRTech
Sophos Threat Report Flags Cyberattack Trends Expected To Shape IT Security In 2021


Sophos, a global leader in next-generation cybersecurity, today published the Sophos 2021 Threat Report, which flags how ransomware and fast-changing attacker behaviors, from advanced to entry level, will shape the threat landscape and IT security in 2021.
The report, written by SophosLabs security researchers, as well as Sophos’ threat hunters, rapid responders, and cloud security and AI experts, provides a three-dimensional perspective on security threats and trends, from their inception to real-world impact.
Three key trends analyzed in the Sophos 2021 Threat Report include:
1. The gap between ransomware operators at different ends of the skills and resource spectrum will increase. At the high end, the big-game hunting ransomware families will continue to refine and change their tactics, techniques and procedures (TTPs) to become more evasive and nation-state-like in sophistication, targeting larger organizations with multimillion-dollar ransom demands. In 2020, such families included Ryuk and RagnarLocker.
At the other end of the spectrum, Sophos anticipates an increase in the number of entry level, apprentice-type attackers looking for menu-driven, ransomware-for-rent, such as Dharma, that allows them to target high volumes of smaller prey.
Another ransomware trend is “secondary extortion,” where alongside the data encryption the attackers steal and threaten to publish sensitive or confidential information, if their demands are not met. In 2020, Sophos reported on Maze, RagnarLocker, Netwalker, REvil, and others using this approach.
“The ransomware business model is dynamic and complex. During 2020, Sophos saw a clear trend towards adversaries differentiating themselves in terms of their skills and targets. However, we’ve also seen ransomware families sharing best-of-breed tools and forming self-styled collaborative ‘cartels,’” said Chester Wisniewski, principal research scientist, Sophos.
“Some, like Maze, appeared to pack their bags and head for a life of leisure, except that some of their tools and techniques have resurfaced under the guise of a newcomer, Egregor. The cyberthreat landscape abhors a vacuum.
If one threat disappears another one will quickly take its place. In many ways, it is almost impossible to predict where ransomware will go next, but the attack trends discussed in Sophos’ threat report this year are likely to continue into 2021.”
2. Everyday threats such as commodity malware, including loaders and botnets, or human-operated Initial Access Brokers, will demand serious security attention. Such threats can seem like low level malware noise, but they are designed to secure a foothold in a target, gather essential data and share data back to a command-and-control network that will provide further instructions.
If human operators are behind these types of threats, they’ll review every compromised machine for its geolocation and other signs of high value, and then sell access to the most lucrative targets to the highest bidder, such as a major ransomware operation. For instance, in 2020, Ryuk used Buer Loader to deliver its ransomware.
“Commodity malware can seem like a sandstorm of low-level noise clogging up the security alert system. From what Sophos analyzed, it is clear that defenders need to take these attacks seriously, because of where they might lead.
Any infection can lead to every infection. Many security teams will feel that once malware has been blocked or removed and the compromised machine cleaned, the incident has been prevented,” said Wisniewski.
“They may not realize that the attack was likely against more than one machine and that seemingly common malware like Emotet and Buer Loader can lead to Ryuk, Netwalker and other advanced attacks, which IT may not notice until the ransomware deploys, possibly in the middle of the night or on the weekend. Underestimating ‘minor’ infections could prove very costly.”
3. All ranks of adversaries will increasingly abuse legitimate tools, well known utilities and common network destinations to evade detection and security measures and thwart analysis and attribution.
The abuse of legitimate tools enables adversaries to stay under the radar while they move around the network until they are ready to launch the main part of the attack, such as ransomware. For nation-state-sponsored attackers, there is the additional benefit that using common tools makes attribution harder. In 2020, Sophos reported on the wide range of standard attack tools now being used by adversaries.
“The abuse of everyday tools and techniques to disguise an active attack featured prominently in Sophos’ review of the threat landscape during 2020. This technique challenges traditional security approaches because the appearance of known tools doesn’t automatically trigger a red flag.
This is where the rapidly growing field of human-led threat hunting and managed threat response really comes into its own,” said Wisniewski. “Human experts know the subtle anomalies and traces to look for, such as a legitimate tool being used at the wrong time or in the wrong place.
To trained threat hunters or IT managers using endpoint detection and response (EDR) features, these signs are valuable tripwires that can alert security teams to a potential intruder and an attack underway.”
Additional trends analyzed in the Sophos 2021 Threat Report include:
· Attacks on servers: adversaries have targeted server platforms running both Windows and Linux, and leveraged these platforms to attack organizations from within
· The impact of the COVID 19 pandemic on IT security, such as the security challenges of working from home using personal networks protected by widely varying levels of security
· The security challenges facing cloud environments: cloud computing has successfully borne the brunt of a lot of the enterprise needs for secure computing environments, but faces challenges different to those of a traditional enterprise network
· Common services like RDP and VPN concentrators, which remain a focus for attacks on the network perimeter. Attackers also use RDP to move laterally within breached networks
· Software applications traditionally flagged as “potentially unwanted” because they delivered a plethora of advertisements, but engaged in tactics that are increasingly indistinguishable from overt malware
· The surprising reappearance of an old bug, VelvetSweatshop – a default password feature for earlier versions of Microsoft Excel – used to conceal macros or other malicious content in documents and evade advanced threat detection
· The need to apply approaches from epidemiology to quantify unseen, undetected and unknown cyberthreats in order to better bridge gaps in detection, assess risk and define priorities
Sophos’ Wisniewski provides an overview of the Sophos 2021 Threat Report in the video below:
GRTech
The Economics of Product Decisions: Applying Behavioural Economics and Game Theory in PM


Product managers often need to make a clear-cut decision: what should we build next? But the decisions which hold real importance go beyond adding features.
It’s about getting what makes people tick.
It goes way beyond what you would expect, getting into how people behave and using game theory.
These areas give insight into how users decide and how a product’s design can improve growth and keep people interested.
This is what Amarachi Nnochiri excels at. She is a senior product manager that knows how to use economics and psychology in her job.
She goes beyond simply managing product tasks; she develops whole product systems based on how users think, feel, and use a service. Her background shows how understanding human psychology and behaviour can give you a significant advantage in the competition.
One idea Amarachi uses is “loss aversion.” In this scenario, people feel worse about losing something than they feel good about gaining something of equal value.
She uses this when designing her products, mostly when it comes to pricing and getting people to try new strategies. For example, instead of giving a free trial, she might use a freemium setup where users get some stuff for free but could lose it if they don’t buy an upgrade. This pushes them to pay.
She might also use progress bars or streak counters, since losing progress gets people to keep using the product.
Amarachi also uses ideas from “game theory” to get how users act and change their behavior. She realizes that users are doing more than operating a product, but are playing a game with other users or with the product itself. She designs things that use ideas like “Nash equilibrium,” where nobody can do better by changing what they’re doing. For a social product, this could mean creating a system where doing something good for yourself (like inviting friends) also helps everyone else. This makes the whole thing stable and positive.
Her know-how in game theory also applies to making strong “network effects.” This means making stuff that gets better as more people use it.
A good example is a social network where each new user makes the product more helpful for everyone else. Amarachi endeavours to make things go viral on purpose, not just by luck.
She might use “commitment devices,” which are things that make a user stick with a behaviour by making them depend on it socially or functionally. For example, inviting team members to a tool makes the user stick with the platform and makes the product’s network stronger.
This way of thinking is better than just following the usual steps. By using these economic and psychological tricks, Amarachi develops competitive advantages which are difficult to replicate.
She knows that a company’s best thing is not just a simple interface, but a product that’s designed to sync with how people behave.
Her product choices aren’t just about the needs of users, but equally focus on motivating them to like the product, use it, and stick with it.
In her work, choosing a subscription price isn’t just a business thing; it’s about behaviour. Designing a social feed isn’t just about the content; it’s about balancing what people want and watching how they interact. Amarachi knows extensively about the economics of product decisions. This makes her products innovative and appealing to human behaviour, which leads to more use, keeps people around, and helps the product grow. She’s a leader in product management, where identifying customer desires is backed by understanding human motivation.


Technology Company, Globacom, has announced significant reductions in its International Direct Dialing (IDD) rates, making international calls more affordable for its existing and new customers across Nigeria.
Effective August 10, the new rates began applying to over 15 popular international destinations, including United States which will has moved to ₦30 per minute, down from ₦35, United Kingdom is now N350 from ₦400, while India also moved down to ₦40 from N45.
The rates for China, Saudi Arabia and Cameroon however recorded major reduction moving to N75, N300 and ₦700 respectively.
The reduction was also extended to African countries including Benin Republic which goes for ₦650 per minute, Niger Republic ₦750, Ghana ₦500, and Togo ₦650. United Arab Emirates also moved from ₦450 to ₦325, Germany to ₦550, Côte d’Ivoire ₦700, Libya ₦700, while calls to Malawi is now N1,100 from ₦1,200.
Glo aims to provide more value for its customers through these revised rates, encouraging them to make Glo their preferred network for international calls. New IDD bundles will also be introduced, offering frequent international callers even more attractive deals.
Globacom, which remained optimistic that frequent international callers will benefit immensely from the reductions in IDD bundles, enjoined customers to take advantage of the new rates to stay connected with friends and business associates across the globe.
GRTech
Oil subsidy removal freed up resources for infrastructure – Enugu Governor
By Orji Israel, South East Correspondent


The Executive Governor of Enugu State, Peter Mbah, has attributed the financing of numerous infrastructure projects embarked by the state government to the oil subsidy removal policy of the President Bola Ahmed Tinubu administration.
He made this declaration at the Govermment House, Enugu, during a courtesy visit by a delegation of federal government led by Minister of Information and National Orientation, Mohammed Idris, as part of activities lined up for the 2-day Citizens’ Engagement Series in the South East geo-political zone.
“For us in Enugu, we are able to accomplish all we promised our people during the campaign, thanks to the bold decision taken by President Bola Tinubu, which has freed up resources needed to execute humongous capital projects,” said Governor, while listing ongoing projects in the state, which include the construction of 7,000 classrooms, 3,300 hospital beds and 2,000-hectare of 260 farm estates across the 260 wards of the state.
Governor Mbah also pledged more support for the policies of the federal government, saying they are in the best interest of the people of the state.
-
GRTech4 days ago
Glo reduces international call rates
-
GRTech3 days ago
The Economics of Product Decisions: Applying Behavioural Economics and Game Theory in PM
-
GRTech4 days ago
Oil subsidy removal freed up resources for infrastructure – Enugu Governor
-
Culture3 days ago
Charles Emembolu Named Chair of Nigeria’s Creative Tech Council (CCTF)
-
GRPolitics4 days ago
Tinubu Hails Winners of By-Elections in 12 States
-
GRtv4 days ago
Ohanaeze Hails Gov Mbah’s 5 Transport Terminals, 100 CNG Buses Across Enugu
-
GRtv4 days ago
Enugu Governor Hails FG’s Renewed Hope Ward Development Programme
-
Transport5 days ago
In an Epic Move, Gov Mbah Inaugurates 5 Ultramodern Bus Terminals, Rolls Out 100 Mass Transit CNG Buses Across Enugu