Cybersecurity Insight

AtomBombing Attacks Strike Windows Users

1 Nov

There are rare instances that an attack will catch users off-guard in the way that this newest instance has – a new type of code injection method nicknamed “AtomBombing” is poised to wreak havoc on Windows Users. Individuals relying on general antivirus software or firewall protection to keep their data and server secure are putting themselves and their vital information in a precarious situation.

Let’s run the hypothetical of how atombombing works on unsuspecting Windows Users: let’s say a user interacts with this malicious file. After this interaction, a basic firewall can easily stop the first phase of an atombombing attack. However, this is where it gets tricky (and from where the malicious action’s name is derived) – the file is able to sidestep the firewall and get into what’s known as an atom table. Atom tables store strings and corresponding identifiers that are defined by the system, which then are able to more or less communicate with applications operating within said system. In other words, once this malicious file gets into any atom table, it can communicate with the application(s) associated and use said application, which has already been approved by the system, to complete the malicious action.

Here’s the issue: there isn’t any way to detect this type of attack currently. The only way to truly protect your systems is to practice safe online habits and be wary of suspicious links, websites, or any download prompts you may come across. As a veteran cyber security firm, Neovera prides itself on its 24×7 managed and monitored security offerings and staying on top of the latest threats to your critical data. By implementing a program that goes beyond the requisite firewall or antivirus software, your network is wholly secure and managed by an established firm in the cyber security industry with the background and expertise to prove it.