1. The number of 0-day attacks increases, increasing the damage.
A large number of people familiar with 0-day mining technology, a convenient underground industrial chain trading platform, and the existence of some 0-day exchange circles, resulting in the recent release of some vulnerabilities in the public's field of view, it is already "under active use", which leads to a worse social impact than ever before due to 0-day attacks.
2. Platform-based
First, attack tools are already platform-based. For example, automatic penetration platforms such as Metasploit will automatically scan, find vulnerabilities, automatically attack, and even perform Intranet penetration.
Furthermore, Trojan viruses are also platform-based. Multiple recently-popular worms or viruses can download dozens of viruses and return to their respective roles. The advantage of modularizing the virus function is that more than 10 of the 40 viruses may be identified by anti-virus software, and the remaining 20 viruses can continue to work, hackers may also use the more than 20 viruses to "return to the battlefield ".
3. Concealment
A few years ago, after PC poisoning, we were able to easily manually kill the virus and continue to use it. Now, the backdoors under various hardware conditions can be cleared even if the system is reinstalled. Each component in the PC, such as a video card, a DVD drive, or a battery, has a memory space to run the firmware. Hackers can use this part of the memory space to hide malicious code. The Code will be loaded the next time the PC is started.