Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Malware-as-a-service is the growing threat every security team must confront today

By Ron Davidson
malware-cyber-crime-freepik.jpg
September 7, 2021

Hackers are entrepreneurs. After legitimate developers built software-as-a-service (SaaS) businesses by renting access to productivity software, cybercriminals seeking new revenue streams created malware-as-a-service (MaaS) as a dangerous alternative. Consequently, amateurs with limited computing expertise and hardware can rent out malware attack servers through the dark web, extorting enterprises with multi-million-dollar ransoms.

 

Today, ransomware constitutes an estimated $1 billion annual threat, as hackers increasingly target enterprises, large-scale organizations, and government entities. There’s every indication that the MaaS model will continue to grow in popularity since it has drastically lowered the skill level required to carry out attacks: Malware arrives instantly ready for use, offering users hacks and servers that eliminate the need for technical skills.

 

IT teams must evolve their cybersecurity protocols to proactively address both the proliferation of MaaS and increased ransomware attacks. In order to prevent breaches, organizations need complete visibility and understanding of their expanding attack surfaces to identify their highest exposure risks. 

 

Vulnerability blind spots are treasure troves for hackers 

Enterprises might believe that they can prevent attacks by addressing critically severe threats, but that’s no longer a viable strategy: Hackers are now targeting low- to medium-severity vulnerabilities and gaining access to under-protected corporate environments. According to recent research, medium-severity vulnerabilities account for 41% of total vulnerabilities globally, and attackers armed with this knowledge exploit deprioritized threats as unguarded backdoors.

 

In 2020, new ransomware samples nearly doubled over the prior year, while all trojan types grew by 128% - volumes that indicate how much the pandemic energized criminals. Multiple incidents of large-scale ransoming, including hospitals and critical infrastructure, provide clear evidence that nation-states and international crime syndicates have turned to MaaS as a cash cow. So although MaaS is often associated with novice attackers, it has broader appeal; North Korea’s infamous Lazarus Group reportedly leveraged Trickbot’s MaaS for successful attacks. 

 

Zero in on what matters

Overburdened security teams have relied too heavily upon traditional vulnerability scanning and patching, which regrettably leave networks underprotected. Scanning does not provide a complete picture of the attack surface, as some devices cannot be reached by traditional scanners. Similarly, patching is an incomplete remediation practice and doesn’t always work across complex corporate networks’ most vulnerable assets. Since business risk increases when enterprises lack viable alternative remediation capabilities, more advanced security posture management programs enable teams to consider alternatives such as applying IPS signatures, changing firewall rules or cloud security tags, or applying configuration changes to their networks or security devices.  

 

Organizations must instead refocus their security efforts for the modern era, mapping their entire attack surfaces to comprehensively identify exposed vulnerabilities, then applying prescriptive remediation options to reduce the most business risk. Three relatively simple steps can make a huge difference:

 

1. Visualize the entire attack surface: Security teams only protect what they see, so creating a comprehensive, enterprise-scale network model is key to any successful security program. The network model needs to go beyond traditional networks, covering corporate networks and hybrid and cloud environments hosting large numbers of physical, virtual and multi-cloud assets.

 

2. Determine exposure levels for each vulnerability: Good tools can simulate attacks before they happen, using a contextually aware model of the network and its security controls. Without subjecting the existing network to interruptions, a security team can use this detailed visualization of the entire attack surface to seek out weaknesses in a highly complex environment, zeroing in on exposed and exploitable vulnerabilities. 

 

3. Access accurate, current intelligence: Organizations seeking to secure modern networks need a cybersecurity solution capable of aggregating all types of security data, wherever it’s being produced. Continually analyzing configuration and security control data from disparate infrastructures can help security teams identify and block the paths of potential breaches. 

 

MaaS exists because it’s profitable: threat actors always chase the money, and cybercriminals generate substantial cash flows by selling MaaS software. This is a testament to the sophistication of both the malware itself and the tactics threat actors are using.

 

Practically, MaaS makes it easier than ever for malicious actors to carry out attacks, which means we’re likely to see further increases in threats against businesses of all sizes. For security teams, the mandate now is to counteract this unfortunate trend – a task that is best accomplished by connecting the dots on disparate data sources and leveraging exposure analysis to greatly reduce business risk.

KEYWORDS: cyber security hackers malware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ron Davidson is VP R&D and CTO at Skybox Security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • healthcare-screen

    Healthcare Organizations Must Balance the Growing Cybersecurity Threat Landscape with Meeting Regulatory Mandates

    See More
  • Data Stream

    The Five Rings: Understanding the importance of physical security of colocation data centers as a fundamental service during COVID-19

    See More
  • risk management

    The 5 must do’s for every workplace risk management plan

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing