A recent report by cybersecurity researchers at Picus Security has uncovered a substantial increase in the presence of Hunter-Killer malware, a sophisticated type of malware designed to actively seek out and neutralize other malware on a system. The malware is known for its ability to identify and remove competing threats that may pose a risk to the security and privacy of affected systems.
According to the report, there has been a 333% surge in the use of Hunter-Killer malware to neutralize network security controls. This increase is cause for concern, as it represents a significant uptick in the prevalence of a particularly evasive and adept form of malware.
In addition to the rise in Hunter-Killer malware, the report also highlighted an increase in other malicious activities. For example, the use of stealth tactics by malware has increased by 70%, making it more difficult for defenders and security researchers to detect and respond to these threats. Similarly, the use of obfuscated files or info (T1027) has risen by 150%, further showcasing the effectiveness of adversaries in hiding malicious activities and preventing digital forensics and incident response.
Furthermore, the report also revealed that the use of the App Layer Protocol (T1071) has surged by 176%. This tactic is often employed by ransomware groups in advanced double extortion tactics, aiding data theft and other malicious activities.
In response to these findings, cybersecurity experts have provided several recommendations to mitigate the risks posed by these evolving cybersecurity threats. These recommendations include leveraging behavioral analysis and machine learning for detection, enhancing defenses against evasion and defense impairment, prioritizing credential protection and lateral movement mitigation, integrating prioritized threat intelligence and counter-espionage, enhancing cyber resilience through asset visibility and attack surface reduction, embracing security validation to assure defense effectiveness, and updating and practicing ransomware response and recovery procedures.
These recommendations are a crucial part of an ongoing effort to stay ahead of the constantly evolving tactics employed by cyber adversaries. By prioritizing the adoption of these practices, organizations can better protect their systems and data from the threats posed by Hunter-Killer malware and other advanced cyber threats.
As the cybersecurity landscape continues to evolve, staying informed about the latest developments in the field is essential. By following reputable sources of cybersecurity news and staying up to date on the latest best practices and recommendations, individuals and organizations can better prepare themselves to defend against the ever-present threat of cyber attacks.

