meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

CISA Alert AA22-216A – 2021 top malware strains. [CISA Cybersecurity Alerts]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 4 August 2022

⏱️ 3 minutes

🧾️ Download transcript

Summary

This joint Cybersecurity Advisory was coauthored by CISA and the Australian Cyber Security Centre, or ACSC. This advisory provides details on the top malware strains observed in 2021. AA22-216A Alert, Technical Details, and Mitigations For alerts on malicious and criminal cyber activity, see the FBI Internet Crime Complaint Center webpage. For more information and resources on protecting against and responding to ransomware, refer to StopRansomware.gov, a centralized, U.S. Government webpage providing ransomware resources and alerts. The ACSC recommends organizations implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a cybersecurity baseline. These strategies, known as the “Essential Eight,” make it much harder for adversaries to compromise systems. Refer to the ACSC’s practical guides on how to protect yourself against ransomware attacks and what to do if you are held at ransom at cyber.gov.au. All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at [email protected] or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or [email protected].

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

This is a SISA Cybersecurity Alert.

0:14.0

ID number Alpha Alpha 22 TAC 216 Alpha.

0:20.0

Original release date, August 4th, 2022.

0:24.0

This joint Cybersecurity Advisory was co-authored by CISA and the Australian Cybersecurity Center or ACSC.

0:35.0

This advisory provides details on the top malware strains observed in 2021.

0:40.0

In 2021, the top malware strains included remote access trojans, banking trojans, information

0:46.6

stealers, and ransomware.

0:48.6

The most prolific users of malware are cyber criminals who use malware to deliver

0:52.5

ransomware or facilitate theft of personal and financial

0:55.4

information.

0:57.0

The alert documentation linked in the show notes includes technical details,

1:00.4

mitigations, detection signatures, and indicators of compromise for the top 11

1:04.6

malware strains of 2021.

1:07.5

Most of the top malware strains have been in use for more than five years, with their respective

1:11.4

code bases evolving into multiple variations.

1:15.0

Updates made by malware developers and reuse of code from these malware strains contribute to

1:19.3

the malware's longevity and evolution into multiple variations.

1:23.0

Malicious actors' use of known malware strains offers organizations opportunities to better prepare, identify, and mitigate attacks from these known malware strains.

1:32.0

In the criminal malware industry, including malware as a service,

1:36.0

developers create malware that distributors often broker to malware end users.

1:40.0

Developers of these top 2021 malware strains continue to support, improve, and

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.