{"id":1929,"date":"2021-12-10T12:00:00","date_gmt":"2021-12-10T12:00:00","guid":{"rendered":"\/cybersecurity-blog\/?p=1929"},"modified":"2022-12-14T07:15:56","modified_gmt":"2022-12-14T07:15:56","slug":"hacker-automation-malware-attacks","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/","title":{"rendered":"11 Ways Hackers are Using Automation to Boost Malware Attacks"},"content":{"rendered":"\n<p>Automation is a process that has been finding its way into almost every industry and business, intending to make systems more efficient. Notably, the cybersecurity industry includes automated data collection, which plays a huge role in the defense against data breaches and cyberattacks.<br><\/p>\n\n\n\n<p>Unfortunately, nowadays, much like all the other techniques they&#8217;ve picked up, hackers and cybercriminals are also expanding their reach towards including automation into their attacks and malicious campaigns, making it a lot easier to scale up their operations.<br><\/p>\n\n\n\n<p>Actually, the tools that <a href=\"https:\/\/go.recordedfuture.com\/hubfs\/reports\/cta-2020-0324.pdf?utm_campaign=AUT-REP-0320&amp;utm_medium=email&amp;_hsmi=84796582&amp;_hsenc=p2ANqtz-_brSnojVrQO9REips5wTbdaeeKNLsFVPPRWLD2LIDaw8JZpn_A8ayRasQ8VtBzQwLZKxBfapWxhuIyRk7mNCQbNDsmzg&amp;utm_content=84796582&amp;utm_source=hs_automation\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">hackers trade on the dark web<\/a> or use in active hacking campaigns all have some sort of automation.&nbsp;<\/p>\n\n\n\n<p>The reason behind this is simple: hackers see automation as a channel for high success rates of cyberattacks and thus more considerable amounts of financial profit quickly and efficiently.&nbsp;&nbsp;<br><\/p>\n\n\n\n<p>This article focuses on how automation helps threat actors acquire and sift through the obtained information, extract the most valuable pieces, and use them against individuals and companies.&nbsp;<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">11 Automation Processes Used by Hackers<\/h2>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Data Breaches and Sale of Databases<\/strong><\/li><\/ol>\n\n\n\n<p>Data loss affects companies and governments all the time. Still, not all the information is relevant to hackers, as some details are expensive and others cost nothing. Attackers sort through gigabytes of hacked files using automated scripts to separate valuable information from &#8220;trash.&#8221;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Credential Stuffing<\/strong><\/li><\/ol>\n\n\n\n<p>Gathering data is one thing, but matching usernames and passwords is yet another step towards acquiring account access. Hackers use automated robotic networks, a.k.a., <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/botnet\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">botnets<\/a>, to find credentials quickly.<br><\/p>\n\n\n\n<p>Manual credential stuffing is humanly impossible. It would take unimaginably long for a person to do what these bots achieve in just minutes. It&#8217;s worth noting that IT teams can&#8217;t fight this type of attack without automation as well. Only more advanced computerization can put an end to this.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Brute Forcers and Checkers<\/strong><\/li><\/ol>\n\n\n\n<p>This trial-and-error method of password guessing, like credential stuffing, can be daunting to accomplish for a human. Hackers use lists of common passwords to gain access to personal and business accounts and steal valuable information.<br><\/p>\n\n\n\n<p>In the case of checkers, criminals test leaked passwords and logins on many websites until there is a match. This approach results in account takeovers up to 2% of the time.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong>Cryptors and Loaders<\/strong><\/li><\/ol>\n\n\n\n<p>Concealing the malware from being detected in the system is another method hackers use to stay in as long as possible. Cryptors confuse the antivirus system, hindering it from recognizing the malicious code. While this tool can be used legitimately within applications, hackers exploit it for nefarious purposes.<br><\/p>\n\n\n\n<p>Spam emails are the main ways to push downloaders into the system. Once the user runs the code, the program loads into their network. Depending on the <a href=\"https:\/\/any.run\/cybersecurity-blog\/ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">kind of ransomware<\/a>, the hacker can create a backdoor, pass your system through a botnet, or start an attack.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li><strong>Keyloggers and Info Stealers<\/strong><\/li><\/ol>\n\n\n\n<p>A keylogger is software that monitors your keyboard activity and uses the gathered information to hack into personal accounts. Although it automatically collects tons of unnecessary details along the way, it&#8217;s still efficient in logging passwords and credit card numbers.<br><\/p>\n\n\n\n<p>Stealers sit in your system, searching for anything from basic operations to personal information. It looks for data in your browser, messages, VPN, gaming and banking software, FTP accounts, and email. While various stealers use different methods to do so, their end goal is one: send useful information to an attacker.<br><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\"><li><strong>Payment Card Sniffers and Banking Injects<\/strong><\/li><\/ol>\n\n\n\n<p>These are designed to find and collect payment card data from eCommerce websites. The sniffer is a JavaScript code that detects card numbers, expiration dates, CVV, and CVC codes. Once the data is collected, the program sends it to the attacker, who uses the sensitive information to steal money or sell the data on the dark web.<br><\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">18 Sniffers Steal Payment Card Data from Print Store Customers &#8211; by <a href=\"https:\/\/twitter.com\/Ionut_Ilascu?ref_src=twsrc%5Etfw\">@Ionut_Ilascu<\/a><a href=\"https:\/\/t.co\/8FUQd3Xm3j\">https:\/\/t.co\/8FUQd3Xm3j<\/a><\/p>&mdash; BleepingComputer (@BleepinComputer) <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1232611753202241536?ref_src=twsrc%5Etfw\">February 26, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Credit and debit card sniffers look for online shops that use third-party services. It&#8217;s easier to hack them, as those applications have a higher vulnerability chance.<br><\/p>\n\n\n\n<p>Financial security threats don&#8217;t end here. <a href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-banks-from-cyberattacks\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Banking<\/a> injections are scripts that reroute the traffic to fake domains and overlays.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\"><li><strong>Exploit Kits<\/strong><\/li><\/ol>\n\n\n\n<p>These are some of the most popular automated attack methods. Due to their couvert nature, they&#8217;re tough to detect. <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/exploit-kits\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Exploit kits<\/a> are used to develop massive remote access tools and control company devices within that network.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"8\"><li><strong>Spam and Phishing<\/strong><\/li><\/ol>\n\n\n\n<p>Nobody is a stranger to spam emails and<a href=\"https:\/\/any.run\/cybersecurity-blog\/phising-types-of-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> phishing attacks<\/a> in this day and age. As a form of social engineering attack, phishing is hard to control.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/UBZXfc3NXfGRGlmedJKbJmfUrqTElu3uVm1f0NW8c45REslMpo5Og8T-cIfpSq1072fhR53OpX95STfI2iWg51IXbCRHi8bxJK9W8astWWfkpWNQV365VwD-uQxWQiBYPiUbMbyl\" alt=\"\"\/><\/figure>\n\n\n\n<p>While your first step should be educating employees, you should also include technical protection methods in your efforts.<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/kmeGYl2dTWTTPiXC-vupI9-uvoRabyMWFfpaYmQ4O-rHVbRKLvy5qYcSt-vG1LQcUYQzpUtqMAtJU2thUAyfOqBTgM4LFXho6Z8czYky_KQe92M8A7-BHx1K2BJ8gfP83Zuir3my\" alt=\"\"\/><\/figure>\n\n\n\n<p>Setting up proper SPF and DKIM records and reaching DMARC reject policy is the minimum you can do to protect your domain and communication from malicious actors. Even if you have everything set up, keeping your domain protection up-to-date should be a top priority.<br><\/p>\n\n\n\n<p>For example, you can use an SPF checker to see if the DNS record contains errors. The checker will highlight issues with email deliverability. It&#8217;s also mandatory to test against new generation hacker attacks to ensure the system stays strong against any penetration.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"9\"><li><strong>Bulletproof Hosting Services (BPHS)<\/strong><\/li><\/ol>\n\n\n\n<p>If you&#8217;re here, you&#8217;re probably aware of regular web hostings. They&#8217;re servers where any website on the internet lives. However, you can&#8217;t just store anything on these. The hosting company and country regulations impose many restrictions regarding the type of content that can go there.<br><\/p>\n\n\n\n<p>Unlike ordinary web hostings, BPHS doesn&#8217;t have such constraints. While they&#8217;re not inherently illegal, they do operate in a legal gray zone. With their &#8220;don&#8217;t ask, don&#8217;t tell&#8221; essence, they open a fantastic opportunity for cybercriminals to host their malicious activities and threats. These hosting providers facilitate geo-spoofing, exploit kits, botnet command centers, and black-market websites.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"10\"><li><strong>Automated Marketplaces<\/strong><\/li><\/ol>\n\n\n\n<p>Hacking databases and acquiring personal and business information is one thing. Still, hackers also buy and sell information on the dark web. As it&#8217;s hard to do the bidding manually, cybercriminals use special plugins that automate the process.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"11\"><li><strong>&nbsp;Code Automation<\/strong><\/li><\/ol>\n\n\n\n<p>Like bulletproof hosting services, code automation isn&#8217;t the problem; it&#8217;s how the tool is used. Hackers can initially hide their attack path, then, using advanced automated code, disperse the virus across the network. If detected, malware replicates itself, changing form. This makes it less likely and more challenging for IT teams to detect and neutralize it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Fight Automated Attacks?<\/h2>\n\n\n\n<p>Automation and tools like bulletproof hosts, keyloggers, and exploit kits make it almost impossible for IT teams to keep up with hackers using <a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">manual methods<\/a>.<br><\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=guest_post&amp;utm_content=11ways\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a> is an online sandbox created especially to analyze incidents and help stop them from recurring. You can open a suspicious file or a link in a safe virtual environment to see how it might affect a real computer, but the sandbox is a guarantee for safe research. Thanks to the interactivity of ANY.RUN, any kind of threat can be <a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">detected<\/a> and investigated. Reboot the virtual machine, surf the Internet, change location \u2013&nbsp;all steps can trigger malware into action.<br><\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to trick malware using ANY.RUN&#039;s TOR feature for fake location\" width=\"770\" height=\"433\" src=\"https:\/\/www.youtube.com\/embed\/b9sbLwxv8I8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>The only way to fight against these attack types is to explore the automation opportunities themselves. It proves especially useful to explore the same tactics and tools attackers use. It will help IT teams beat the attackers in their own game.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Automation is a process that has been finding its way into almost every industry and business, intending to make systems more efficient. Notably, the cybersecurity industry includes automated data collection, which plays a huge role in the defense against data breaches and cyberattacks. Unfortunately, nowadays, much like all the other techniques they&#8217;ve picked up, hackers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3735,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5],"tags":[36],"class_list":["post-1929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","category-guest-posts","tag-attack"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>11 Ways Hackers are Using Automation to Boost Malware Attacks - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Today we discuss 11 ways of how threat actors use automation to acquire and sift through the stolen data against individuals and companies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hasmik Khachunts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/\"},\"author\":{\"name\":\"Hasmik Khachunts\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"11 Ways Hackers are Using Automation to Boost Malware Attacks\",\"datePublished\":\"2021-12-10T12:00:00+00:00\",\"dateModified\":\"2022-12-14T07:15:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/\"},\"wordCount\":1245,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"attack\"],\"articleSection\":[\"Cybersecurity Lifehacks\",\"Guest Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/\",\"name\":\"11 Ways Hackers are Using Automation to Boost Malware Attacks - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2021-12-10T12:00:00+00:00\",\"dateModified\":\"2022-12-14T07:15:56+00:00\",\"description\":\"Today we discuss 11 ways of how threat actors use automation to acquire and sift through the stolen data against individuals and companies.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Instructions on ANY.RUN\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"11 Ways Hackers are Using Automation to Boost Malware Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Hasmik Khachunts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/hasmik-khachunts.jpeg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/hasmik-khachunts.jpeg\",\"caption\":\"Hasmik Khachunts\"},\"description\":\"Hasmik Khachunts inspires with words at EasyDMARC. She produces blog posts and guest articles about domain protection, email security and cybersecurity.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/khachunts\/\"],\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"11 Ways Hackers are Using Automation to Boost Malware Attacks - ANY.RUN&#039;s Cybersecurity Blog","description":"Today we discuss 11 ways of how threat actors use automation to acquire and sift through the stolen data against individuals and companies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/","twitter_misc":{"Written by":"Hasmik Khachunts","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/"},"author":{"name":"Hasmik Khachunts","@id":"https:\/\/any.run\/"},"headline":"11 Ways Hackers are Using Automation to Boost Malware Attacks","datePublished":"2021-12-10T12:00:00+00:00","dateModified":"2022-12-14T07:15:56+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/"},"wordCount":1245,"commentCount":2,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["attack"],"articleSection":["Cybersecurity Lifehacks","Guest Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/","url":"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/","name":"11 Ways Hackers are Using Automation to Boost Malware Attacks - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2021-12-10T12:00:00+00:00","dateModified":"2022-12-14T07:15:56+00:00","description":"Today we discuss 11 ways of how threat actors use automation to acquire and sift through the stolen data against individuals and companies.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/hacker-automation-malware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Instructions on ANY.RUN","item":"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/"},{"@type":"ListItem","position":3,"name":"11 Ways Hackers are Using Automation to Boost Malware Attacks"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Hasmik Khachunts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/hasmik-khachunts.jpeg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/hasmik-khachunts.jpeg","caption":"Hasmik Khachunts"},"description":"Hasmik Khachunts inspires with words at EasyDMARC. She produces blog posts and guest articles about domain protection, email security and cybersecurity.","sameAs":["https:\/\/www.linkedin.com\/in\/khachunts\/"],"url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1929"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1929"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1929\/revisions"}],"predecessor-version":[{"id":3736,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1929\/revisions\/3736"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3735"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}