Falling Returns Mean Cyberecriminals Are Turning To Unconventional Methods

Falling returns from cyber-attacks are forcing criminals to use unconventional methods to extort money as internet users become more savvy and incidents of crimes decline, a report from Symantec has found.

Primarily due to increased awareness, for the first time since 2013, ransomware incidents fell by 20 per cent last year. Ransomware is a breached software that threatens to publish the victim's data or permanently block access for them unless a ransom is paid.

More than 4,800 websites are compromised globally each month with a type of hacking called form-jacking, in which a malicious code is added to retailers’ websites to steal bank card details of shoppers, according Symantec.

“Globally, one in 344 form-jacking attacks were blocked in the UAE, representing a serious threat for both local businesses and consumers,” said Gordon Love, vice president of Europe, Middle East and Africa emerging region at Symantec.

Consumers have no way to know if they are visiting a breached online retailer without using a comprehensive security solution, leaving valuable personal and financial information vulnerable, he added. Only 10 credit cards stolen from each of the 4,800 compromised websites every month could yield up to $2.2 million each, according to Symantec’s report, adding that attackers are increasingly focusing on Internet of Things as an entry point to technical systems.

“With an increasing trend towards the convergence of IT and industrial IoT, the next cyber battlefield is operational technology" said Mr Love.

“A growing number of groups have displayed interest in compromising operational systems and industrial control systems to potentially prepare for cyber warfare.”

The report also reveals that in in the UAE, email malware attacks have increased year-on-year, double the global average. 
In 2018, one in 183 emails in the UAE had included a malicious attachment or link, whereas the global average was one in 412 emails during the same time period.

The type of cyber-attacks also depends on the company size.  Companies in the UAE with more than 2,500 employees were most likely to be targeted by malware, a software damaging computer networks.  Whereas, medium-sized companies with 500 to 1,000 employees are likely to be most affected by spam emails, unsolicited messages sent in bulk.

The National

You Might Also Read:

Cyber Criminals Are Aiming At Business:

 

 

 

« NATO Defense Spending Should Privilege Cyber
Fake News Prompts International Concern »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

DomainTools

DomainTools

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.