All Posts
Cyber Threat Intelligence
1
min read

5 Ways to Prevent an Untargeted Attack

Published on
July 27, 2016
Table of Contents

The Internet is lurking with all manner of thieves and spies. Hacking tools which are more and more sophisticated are being churned out in greater numbers. All manner of threats can be categorized into either a targeted or untargeted attack. The distinction is that targeted attacks are delivered to you personally, whereas an untargeted attack is a “trap” you engage yourself. Here are the five main ways to prevent bringing this devastation about.

  1. Use up to date anti-malware software, preferably integrated with threat intelligence. Automated tools and scripts are crawling the web right now looking for networks to exploit or penetrate through brute force. Having a firewall and looking out for worms, Trojans and other forms of viruses, requires the most current definitions. Get the best platform you can and update it regularly.
  2. Have strong security policies and follow them. Your business could fail permanently after a breach. Don’t risk your future on an assumption people are not abusing Internet privileges. Be selective about when to log in with administrator credentials. Not every employee needs access to every file, so limit access on an as-needed basis. If possible, block out all non-work related traffic. Forbid downloading of software, especially games and music. Pirated software is infected with malware 1/3 of the time.
  3. Have a cyber-crime emergency plan. Regularly create backups for the event malware brings about a ransomware attack. If an untargeted attack allows criminals to access your network, they could find it valuable. A black market exists where the perpetuator of an untargeted attack can sell the personal information about employees, students, patients, etc. If others have been done harm because you were the victim of an untargeted attack, you are still responsible for making amends. Losses include making financial restitution, lost production, compromised company secrets, and the cost of crisis communication to manage the reputation damage.

    Ransomware is a targeted attack, however, it is often brought about as result of bringing about an untargeted attack. If a virus is holding your network and all of its files and programs hostage, some say not to pay, whereas others say to acquiesce to their demands and try to never let it happen again. In the event the powers that be decide paying the ransom is easier, know in advance how to access crypto-currency. This way, the payoff can happen as quickly as possible minimizing productivity lost during down time.
  1. Fight fire with fire. You can hack back by deceiving cyber-criminals and taking a page from their playbook. Using a honeypot to gather intelligence will give you detailed evidence to examine after the threat of an untargeted attack. Use hacking techniques on yourself to identify weaknesses and address them before they’re exploited. Tools are available to explore your network for credentialing weaknesses like default or easily guessable passwords.
  2. Be educated and think before you click. Even work-authorized sites could be infected with malware. Look out for infected sites or spam-bot emails, and do not install unauthorized software applications or click pop-up ads. Let less experienced web users know if they’re not sure about a web link, it’s preferable to ask.

With increasing sophisticated techniques for targeted attacks, some say an untargeted attack is going after “low hanging fruit.” Still, enough people are reaching for said fruit to make it absolutely necessary for you to be aware of and protected from the realities of the dangers lying in wait.

Make sure you are not in the pathway of an attack and build your threat intelligence program today.

View It Here

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All