Digital Times Nigeria
  • Home
  • Telecoms
    • Broadband
  • Business
    • Banking
    • Finance
  • Editorial
    • Opinion
    • Big Story
  • TechExtra
    • Fintech
    • Innovation
  • Interview
  • Media
    • Social
    • Broadcasting
Facebook X (Twitter) Instagram
Trending
  • “How Do I Kelee Gi?”: The Song That Rose From The Rubble Of A Lagos Bomb Blast
  • Hydrogen, Lagos State Govt Power Wellness Drive For Business Owners In Ikeja
  • Tinubu Hails NASENI’s Contributions To National Economy
  • Experts @ABoICT 2025 Warn Of Digital Disaster Risks In Nigeria Without AI Governance
  • NCC Unveils e-Health Project In Akure To Boost Digital Healthcare
  • PalmPay Unveils ‘Passing The Baton’ CSR Initiative To Drive Financial Inclusion In Northern Nigeria
  • Anambra Shines In E-Governance, Ranks Among Top Three States
  • EMOSIM Launches eSIM In Lagos, Heralds New Era Of Global Connectivity And Digital Inclusion
Facebook X (Twitter) Instagram
Digital Times NigeriaDigital Times Nigeria
  • Home
  • Telecoms
    • Broadband
  • Business
    • Banking
    • Finance
  • Editorial
    • Opinion
    • Big Story
  • TechExtra
    • Fintech
    • Innovation
  • Interview
  • Media
    • Social
    • Broadcasting
Digital Times Nigeria
Home » HP Q3 Wolf Security Report Released
Business

HP Q3 Wolf Security Report Released

DigitalTimesNGBy DigitalTimesNG1 December 2022No Comments4 Mins Read3 Views
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
HP REPORT
Share
Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp

HP Inc. Thursday issued its third quarter HP Wolf Security Threat Insights Report, finding that archive file formats such as ZIP and RAR files – were the most common file type for delivering malware, surpassing Office files for the first time in three years.

This report provides an analysis of real-world cyberattacks, helping organizations to keep up with the latest techniques cybercriminals use to evade detection and breach users in the fast-changing cybercrime landscape.

Based on data from millions of endpoints running HP Wolf Security, the research found 44% of malware was delivered inside archive files – an 11% rise on the previous quarter – compared to 32% delivered through Office files such as Microsoft Word, Excel, and PowerPoint.

The report identified several campaigns that were combining the use of archive files with new HTML smuggling techniques – where cybercriminals embed malicious archive files into HTML files to bypass email gateways – to then launch attacks.

For example, recent QakBot and IceID campaigns used HTML files to direct users to fake online document viewers that were masquerading as Adobe. Users were then instructed to open a ZIP file and enter a password to unpack the files, which then deployed malware onto their PCs.

As the malware within the original HTML file is encoded and encrypted, detection by email gateway or other security tools is very difficult. Instead, the attacker relies on social engineering, creating a convincing and well-designed web page to fool people into initiating the attack by opening the malicious ZIP file.

READ ALSO  Hilphilk Consulting: Making Global Education A Seamless Venture

In October, the same attackers were also found using fake Google Drive pages in an ongoing effort to trick users into opening malicious ZIP files.

“Archives are easy to encrypt, helping threat actors to conceal malware and evade web proxies, sandboxes, or email scanners. This makes attacks difficult to detect, especially when combined with HTML smuggling techniques.

“What was interesting with the QakBot and IceID campaigns was the effort put into creating the fake pages – these campaigns were more convincing than what we’ve seen before, making it hard for people to know what files they can and can’t trust,” explains Alex Holland, Senior Malware Analyst, HP Wolf Security threat research team, HP Inc.

HP also identified a complex campaign using a modular infection chain, which could potentially enable attackers to change the payload – such as spyware, ransomware, keylogger – mid-campaign, or to introduce new features, like geo-fencing.

This could enable an attacker to change tactics depending on the target they have breached. By not including malware directly in the attachment sent to the target, it is also harder for email gateways to detect this type of attack.

“As shown, attackers are constantly switching up techniques, making it very difficult for detection tools to spot,” comments Dr Ian Pratt, Global Head of Security for Personal Systems, HP Inc.

“By following the Zero Trust principle of fine-grained isolation, organizations can use micro-virtualization to make sure potentially malicious tasks – like clicking on links or opening malicious attachments – are executed in a disposable virtual machine separated from the underlying systems.

READ ALSO  Africa Data Centres Partner Nigeria's IXPN

“This process is completely invisible to the user, and traps any malware hidden within, making sure attackers have no access to sensitive data and preventing them from gaining access and moving laterally.”

HP Wolf Security runs risky tasks like opening email attachments, downloading files and clicking links in isolated, micro-virtual machines (micro-VMs) to protect users, capturing detailed traces of attempted infections.

HP’s application isolation technology mitigates threats that can slip past other security tools and provides unique insights into novel intrusion techniques and threat actor behaviour.

By isolating threats on PCs that have evaded detection tools, HP Wolf Security has specific insight into the latest techniques being used by cybercriminals.

To date, HP customers have clicked on over 18 billion email attachments, web pages, and downloaded files with no reported breaches.t the data

This data was anonymously gathered within HP Wolf Security customer virtual machines from July-September 2022.

HP Inc. is a technology company that believes one thoughtful idea has the power to change the world. Its product and service portfolio of personal systems, printers, and 3D printing solutions helps bring these ideas to life.

HP Wolf Security is a new breed of endpoint security. HP’s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators.

HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services.

 

#HP #Q3 Wolf Security Report #RAR Files #ZIP Featured
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article2022 E-Waste Dialogue: ITREALMS, EPRON, Ecofeld Collaborate On Small E-Waste Collection
Next Article Danbatta Named After Huawei-Powered Computer Lab In Kano
DigitalTimesNG
  • X (Twitter)

Related Posts

“How Do I Kelee Gi?”: The Song That Rose From The Rubble Of A Lagos Bomb Blast

31 May 2025

Experts @ABoICT 2025 Warn Of Digital Disaster Risks In Nigeria Without AI Governance

30 May 2025

TD Africa Turns Up The Heat On Tech Accessibility, Unveils ‘Black Friday Every Friday’ Campaign

27 May 2025

SBTS Group CEO, Evelyn Lewis Named Among Nigeria’s 50 Most Valuable Digital Economy Leaders

26 May 2025

Seun Dania Clinches Two Major Honours As Alpha-Geek Earns Top Industry Award

26 May 2025

ABoICT Awards 2025 Holds Saturday, May 24, Celebrates ICT’s Role In Nigeria’s Economic Growth

22 May 2025

Comments are closed.

Categories
About
About

Digital Times Nigeria (www.digitaltimesng.com) is an online technology publication of Digital Times Media Services.

Facebook X (Twitter) Instagram
Latest Posts

“How Do I Kelee Gi?”: The Song That Rose From The Rubble Of A Lagos Bomb Blast

31 May 2025

Hydrogen, Lagos State Govt Power Wellness Drive For Business Owners In Ikeja

30 May 2025

Tinubu Hails NASENI’s Contributions To National Economy

30 May 2025
Popular Posts

Building Explainable AI (XAI) Dashboards For Non-Technical Stakeholders

2 May 2022

Building Ethical AI Starts With People: How Gabriel Ayodele Is Engineering Trust Through Mentorship

8 January 2024

Gabriel Tosin Ayodele: Leading AI-Powered Innovation In Web3

8 November 2022
© 2025 Digital Times NG. Designed by Max Excellence LLC.
  • Advert Rate
  • Terms of Use
  • Advertisement
  • Private Policy
  • Contact Us

Type above and press Enter to search. Press Esc to cancel.