From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained. Join Symantec's leading threat expert, Kevin Haley as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights.
22. Difficult for victims
to identify attacks as
trusted processes are
hijacked
May provide attacker
with elevated privileges
during installation
number of infections can
grow quickly as users
update automatically
Targeting of specific
regions or sectors
Infiltration of isolated
targets, such as those in
industrial environments
Infiltration of well-
protected organizations
by leveraging a trusted
channel