The threat landscape continues rapid evolution
Cyber attackers are producing new tricks. In our most recent report, we dive into the latest major threat trends:
-
Trojans and droppers are being re-used
-
Multi-staged attacks are becoming the norm
-
Cryptomining leads to other cyber threats
-
Pandemic topics open new attack routes
Change told by the numbers
Trend #1: Repurposing trojans and droppers for new forms of malware delivery
Attackers are using and re-using malware that has been proven to deliver results. They’re doing this as part of a larger, orchestrated attack chain. Two major reasons for their success are:
- Their ability to deploy follow-up malware that does further damage down the cyber attack chain
- Their highly distributed command-and-control (C2) infrastructure makes take-down harder

Trend #2: Orchestrated, multi-staged, and evasive attacks are becoming the norm
Attackers are employing complex attacks that use new delivery mechanisms such as macros and other legitimate application functionality to:
- Evade detection
- Hide the theft of data
- Coordinate through command and control servers
“Cybersecurity professionals need new tricks to sort the hidden bad actors . . . One tool that could reveal these hidden threats is the use of entropy.”
-Shyam S. Ramaswami
Security Researcher, Cisco
Trend #3: Cryptomining opens the door to other cyber threats
Some think that cryptomining is not a big concern. But there are situations that pose more risk, such as cryptomining software that, when loaded, becomes the first step in a multi-staged attack on your infrastructure.

Trend #4: Attackers using pandemic-related themes to pick the cyber locks
The pandemic has a lot of people on edge. Bad actors are taking advantage of our interest in the topic and setting up numerous sites to phish for credentials and drop malware.
Key takeaways
The world is changing, threats are changing, and you should be changing too.