Worldwide Cyber Security Threats

The last 12 months have seen cyber criminals take advantage of the COVID-19 pandemic and the increase in remote work to step up their attacks, exploiting both technical and human vulnerabilities. 

As attackers increasingly automate attacks, it’s easy for them to target hundreds, if not thousands of small businesses at once. Small businesses often have less stringent technological defences, less awareness of threats and less time and resource to put into cyber security. This makes them an easier target for hackers than bigger organisations.

Cyber security threats, risks and challenges vary significantly around the world from one country to another. 

Here are the top cyber security issues in parts of the world today: 

Africa:   Several African countries have very well-developed mobile digital currency systems with millions of users. People use these for salaries, groceries and transportation in some countries, especially in Kenya. Gangs attack these systems hoping to steal money from customers. While most global vulnerability assessments worry most about data protection, these mobile digital currency systems worry about money protection. 

The urban coastal regions of Africa also face risk from ransomware attempts on ports. Ports in South Africa, for example, saw shutdowns after a serious cyber attack on one of the ports. 

Regional and international tensions in East Africa and elsewhere engender cyber-spying cyber security threats, most recently using Pegasus spyware. As of the end of 2020, some 11 African national governments found Pegasus spyware. They presumed it to be part of spy work from both within the region and from abroad. 

South America:   Latin America is under cyber attack. Cyber attacks are on the rise globally, but Latin America is seeing more than its fair share. There is also low public awareness about cyber crime due to a lack of government programs to educate the public. According to an ESET Latin American Security Report (2017), the number of reported ransomware cases grew 131% in 2016. In Brazil alone, cyber attacks increased 197% in 2015, and a survey of Brazilian companies revealed that one-third had experienced a cyber crime. Many of these use COVID-related social engineering content, according to Trend Micro.

One major strain is fear-mongering COVID-related phishing scams. These aim to collect the information the criminals need to commit insurance and identity fraud. Emails offer stimulus money, access to vaccines and other benefits in exchange for personal information or downloading malware. 

The most heavily targeted countries in Latin America are those with the largest economies: Brazil, Mexico, Colombia and Argentina. 

Mexico has been hit recently by a large malware attack on oil giant Pemex as well as the Ministry of Economy. 
In Latin America and the Caribbean, state-sponsored attacks tend to spike in advance of international treaties, economic summits and other such events.

United States:   The US is targeted for all kinds of cyber security threats, especially very large-scale state-sponsored attacks like the SolarWinds attack. These are long-term and very sophisticated. Attackers could have a wide range of goals, from political and industrial espionage to influencing operations. 

Asia:   Geopolitical tensions in the region drive state-sponsored influence operations, cyber espionage and targeted financial crimes. Phishing attacks remain a common entry point for many cyber attacks across Asia. 
Tensions between countries drive a large number of cyber threats from both nation-state and non-governmental actors in all countries involved. Look at China and India, China and Taiwan, India and Pakistan, North Korea and South Korea and, of course, tensions between the U.S. and China, North Korea and Russia.

Also, much of the world’s electronics supple chain infrastructure is in Asia and the global trend of supply chain attack and disruption is acute in the region.

Electronics exporters, like Vietnam and Malaysia, depend on buyers and manufacturers in China, and vice versa. 
Plus, the world depends on goods made in China. Disrupting any part of this supply chain slows deliveries, raises prices and applies pressure to all concerned. Many of these connections involve cooperation and partnership in public and rivalry in private. Rivalries play out through cyber attacks and espionage.

North Korea deserves particular mention, as that country has a robust state-sponsored cyber-attack apparatus. On the other hand, the country has almost no targets for foreign adversaries to hit back due to the lack of development and internet connectivity there. 

Russia & Turkey:   Turkey and Russia straddle both Europe and Asia. Many global cybersecurity threats, both state-sponsored and criminal, start from Russia in particular. In the past year, according to a report from Microsoft, nearly 60% of the world’s observed state-sponsored attacks started with the Russian government, and one-third of the world’s successful cyber-attacks from non-state actors started there, too. 

The new wave of ransomware-as-a-service attacks is mostly a Russian trend. A disproportionate share of information operations and election-related disinformation campaigns start in Russia as well. 

Europe:   European hospitals have been affected by dangerous ransomware attacks in Ireland, France and elsewhere in a big way. The two French hospitals were attacked within a week, following several previous attacks in 2020, by attackers using the crypto-virus Ryuk. Both were battling COVID-19 and were at high capacity.

The attack on the Irish health service earlier this year disrupted health care nationwide and forced health care workers to resort to using paper records. 

The number of serious cyber attacks effectivley doubled from 2020 to 2021, according to ENISA

Middle East:   The Middle East region has more than its fair share of state-sponsored cybersecurity threats. These aim to disrupt rivals, cause economic hardship and sometimes even cause internal political frictions. An attack in Iran recently, for example, caused major disruptions to consumer petrol sales. In apparent response, people breached gasoline signs criticising the government for the gasoline lines. 

Any vulnerability analysis in the Middle East has to take account of the constant cyber conflict between Israel and its various hostile neighbours.

Many of the types and methods of cyber attacks around the world are similar, with malware and ransomware topping the list. At the same time, the attackers’ goals vary widely. The one thing all of these attacks have in common is that they appear all over the world.

ENISA:       Verizon:     CSIS:     IEEE:    Security Intelligence:     CSO Online:    Expert Insights:  

You Might Also Read: 

International Effort To Reduce Ransomware Attacks:

 

« Tesla Drivers Can’t Unlock Their Cars
Britain Is Fighting A Ransomware Epidemic »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Sophos

Sophos

Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

WebOrion

WebOrion

WebOrion is an All-in-One Web Security & Performance Suite. Fortify, accelerate and monitor your website today.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Oman Data Park

Oman Data Park

The Data Park is Oman’s premier IT Managed Services provider. We offer a superior Tier 3 Data Center network providing cyber security and cloud services.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

CDS

CDS

CDS is a strategic change agency enabling organisations and businesses to create and build better services to meet the evolving needs of customers, employees and citizens.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.