{"id":14709,"date":"2023-12-06T10:34:49","date_gmt":"2023-12-06T15:34:49","guid":{"rendered":"https:\/\/collierclerk.com\/?p=14709"},"modified":"2026-01-20T12:59:35","modified_gmt":"2026-01-20T17:59:35","slug":"malicious-attackers-frequently-target-commonly-used-technologies","status":"publish","type":"post","link":"https:\/\/app.collierclerk.com\/collierclerkcom\/malicious-attackers-frequently-target-commonly-used-technologies\/","title":{"rendered":"Malicious Attackers Frequently Target Commonly Used Technologies"},"content":{"rendered":"<p>Attacks on commonly used technology hardware and software are frequent, and the trend is on the rise. Attackers target widely used products because of their popularity; their widespread use increases the potential for a successful attack.\u00a0<\/p>\n<p>A 2022 report by Symantec found that 89% of targeted attacks made use of common IT tools. Here are some examples:<\/p>\n<ul>\n<li>Operating systems (e.g., Windows, macOS, Linux) (This covers most personal computers, tablets and phones).<\/li>\n<li>Web browsers (e.g., Chrome, Firefox, Edge)<\/li>\n<li>Productivity software (e.g., Microsoft Office, Google Workspace)<\/li>\n<li>Cloud computing platforms (e.g., AWS, Azure, GCP)<\/li>\n<li>Remote management tools (e.g., RDP, SSH)<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14710\" src=\"https:\/\/collierclerk.com\/wp-content\/uploads\/7-5-300x158.png\" alt=\"\" width=\"600\" height=\"315\" srcset=\"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-content\/uploads\/7-5-300x158.png 300w, https:\/\/app.collierclerk.com\/collierclerkcom\/wp-content\/uploads\/7-5-1024x538.png 1024w, https:\/\/app.collierclerk.com\/collierclerkcom\/wp-content\/uploads\/7-5-150x79.png 150w, https:\/\/app.collierclerk.com\/collierclerkcom\/wp-content\/uploads\/7-5-768x403.png 768w, https:\/\/app.collierclerk.com\/collierclerkcom\/wp-content\/uploads\/7-5.png 1200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The motivations behind these attacks vary, but they include financial gain, data theft, disruption of services, or political motives. Attackers may exploit vulnerabilities in the hardware or software, or they may use social engineering techniques to trick users into revealing sensitive information. Some of the exploitation methods include:<\/p>\n<ul>\n<li><u>Vulnerability exploitation:<\/u> Attackers look for known technology vulnerabilities and exploit them.<\/li>\n<li><u>Phishing:<\/u> Attackers send phishing emails or text messages trying to trick users into revealing confidential information or clicking on malicious links. These messages usually imply urgency or offer some material gain.\u00a0 They are designed to solicit a fast response from the user before they become suspicious.<\/li>\n<li><u>Supply chain attacks:<\/u> Attackers target software vendors or other third-party organizations to gain access to their customers&#8217; systems and data.<\/li>\n<\/ul>\n<p>The Clerk\u2019s Office works diligently to keep our computer systems up-to-date and to educate our employees in the best and most secure procedures.\u00a0 We are proactive in our approach to identifying potential risks and mitigating opportunities for malicious attackers.\u00a0 Through this approach, we increase resiliency and safeguard our digital assets. The Clerk has an IT staff to do this, and you don\u2019t, but there are nonetheless things you can do to reduce your personal technology risk:<\/p>\n<ul>\n<li>Stay informed about the latest security trends and attack methods.<\/li>\n<li>Keep your hardware and software up-to-date and apply new security patches promptly.<\/li>\n<li>Take advantage of reputable sources of information about cybersecurity online, for example:\n<ul>\n<li><a href=\"https:\/\/staysafeonline.org\/resources\/\">National Cybersecurity Alliance (staysafeonline.org)<\/a><\/li>\n<li><a href=\"https:\/\/www.fbi.gov\/how-we-can-help-you\/scams-and-safety\">Scams and Safety \u2014 FBI<\/a><\/li>\n<li><a href=\"https:\/\/consumer.ftc.gov\/identity-theft-and-online-security\/online-privacy-and-security\">Online Privacy and Security (ftc.gov)<\/a><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Cybersecurity%2520and%2520Older%2520Americans.pdf\">Cybersecurity and Older Americans (Cisa.Gov)<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><a href=\"https:\/\/designrr.page?id=248802&amp;token=3515442007&amp;h=2746\">Download the full December 2023 Newsletter<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attacks on commonly used technology hardware and software are frequent, and the trend is on the rise. Attackers target widely &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Malicious Attackers Frequently Target Commonly Used Technologies\" class=\"read-more button\" href=\"https:\/\/app.collierclerk.com\/collierclerkcom\/malicious-attackers-frequently-target-commonly-used-technologies\/#more-14709\" aria-label=\"Read more about Malicious Attackers Frequently Target Commonly Used Technologies\">Read more<\/a><\/p>\n","protected":false},"author":19,"featured_media":14710,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[854,853,690,856,857,855],"class_list":["post-14709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-announcements","tag-common-it-tools","tag-cyber-attack","tag-cybersecurity","tag-phishing","tag-supply-chain-attacks","tag-vulnerability-exploitation","infinite-scroll-item","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-25","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/posts\/14709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/comments?post=14709"}],"version-history":[{"count":2,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/posts\/14709\/revisions"}],"predecessor-version":[{"id":14772,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/posts\/14709\/revisions\/14772"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/media\/14710"}],"wp:attachment":[{"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/media?parent=14709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/categories?post=14709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/app.collierclerk.com\/collierclerkcom\/wp-json\/wp\/v2\/tags?post=14709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}