Cyber Ad-Versaries Using Analytics To Measure“Victims Per Click” HP Warns Of Rise In Malicious PDF Campaigns And Office Exploits, While Noting Office Macros Persist
- DarkGate campaign uses Ad tools to sharpen attacks: Malicious PDF attachments, posing as OneDrive error messages, direct users to sponsored content hosted on a popular ad network. This leads to DarkGate malware.
- By using ad services, threat actors can analyze which lures generate clicks and infect the most users – helping them refine campaigns for maximum impact. Threat actors can use CAPTCHA tools to prevent sandboxes from scanning malware and stopping attacks by ensuring only humans click. DarkGate hands backdoor access to cybercriminals into networks, exposing victims to risks like data theft and ransomware.
Alex Holland, Senior Malware Analyst in the HP Wolf Security threat research team, comments:
“Cybercriminals are becoming adept at getting into our heads and understanding how we work. For instance, the design of popular cloud services is always being refined, so when a fake error message appears, it won't necessarily raise an alarm, even if a user hasn't seen it before. With GenAI generating even more convincing malicious content at little-to-no cost, distinguishing real from fake will only get harder.”
By isolating threats that have evaded detection tools on PCs – but still allowing malware to detonate safely – HP Wolf Security has specific insight into the latest techniques used by cybercriminals in the fast-changing cybercrime landscape. To date, HP Wolf Security customers have clicked on over 40 billion email attachments, web pages, and downloaded files with no reported breaches.
The report details how cybercriminals continue to diversify attack methods to bypass security policies and detection tools. Other findings include:
- Archives were the most popular malware delivery type for the seventh quarter running, used in 30% of malware analyzed by HP. At least 14% of email threats identified by HP Sure Click bypassed one or more email gateway scanners. The top threat vectors in Q4 were email (75%), downloads from browsers (13%) and other means like USB drives (12%).
Dr. Ian Pratt, Global Head of Security for Personal Systems at HP Inc., comments:
“Cybercriminals are applying the same tools a business might use to manage a marketing campaign to optimize their malware campaigns, increasing the likelihood the user will take the bait. To protect against well-resourced threat actors, organizations must follow zero trust principles, isolating and containing risky activities like opening email attachments, clicking on links, and browser downloads.”
HP Wolf Security* runs risky tasks in isolated, hardware-enforced virtual machines running on the endpoint to protect users, without impacting their productivity. It also captures detailed traces of attempted infections. HP's application isolation technology mitigates threats that can slip past other security tools and provides unique insights into intrusion techniques and threat actor behavior.
About the data:
This data was gathered from consenting HP Wolf Security customers from October-December 2023 .
About HP:
HP Inc. (NYSE: HPQ) is a global technology leader and creator of solutions that enable people to bring their ideas to life and connect to the things that matter most. Operating in more than 170 countries, HP delivers a wide range of innovative and sustainable devices, services and subscriptions for personal computing, printing, 3D printing, hybrid work, gaming, and more. For more information, please visit: style="font-weight: 400">About HP Wolf Security:
HP Wolf Security is world class endpoint security. HP's portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services. Visit href="" data-saferedirecturl="://hp/wolf&source=gmail&ust=1708076721174000&usg=AOvVaw1j9eyxQDhpVtp_r72ieDr-"
*HP Wolf Security for Business requires Windows 10 or 11 Pro and higher, includes various HP security features and is available on HP Pro, Elite, RPOS and Workstation products. See product details for included security features.

Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.
Most popular stories
Market Research

- Invromining Expands Multi-Asset Mining Platform, Launches New AI-Driven Infrastructure
- Superconducting Materials Market Size, Trends, Global Industry Overview, Growth And Forecast 2025-2033
- United States Lubricants Market Growth Opportunities & Share Dynamics 20252033
- Building Automation System Market Size, Industry Overview, Latest Insights And Forecast 2025-2033
- Brazil Edtech Market Size, Share, Trends, And Forecast 2025-2033
- Australia Automotive Market Size, Share, Trends, Growth And Opportunity Analysis 2025-2033
Comments
No comment