Falling Returns Mean Cyberecriminals Are Turning To Unconventional Methods

Falling returns from cyber-attacks are forcing criminals to use unconventional methods to extort money as internet users become more savvy and incidents of crimes decline, a report from Symantec has found.

Primarily due to increased awareness, for the first time since 2013, ransomware incidents fell by 20 per cent last year. Ransomware is a breached software that threatens to publish the victim's data or permanently block access for them unless a ransom is paid.

More than 4,800 websites are compromised globally each month with a type of hacking called form-jacking, in which a malicious code is added to retailers’ websites to steal bank card details of shoppers, according Symantec.

“Globally, one in 344 form-jacking attacks were blocked in the UAE, representing a serious threat for both local businesses and consumers,” said Gordon Love, vice president of Europe, Middle East and Africa emerging region at Symantec.

Consumers have no way to know if they are visiting a breached online retailer without using a comprehensive security solution, leaving valuable personal and financial information vulnerable, he added. Only 10 credit cards stolen from each of the 4,800 compromised websites every month could yield up to $2.2 million each, according to Symantec’s report, adding that attackers are increasingly focusing on Internet of Things as an entry point to technical systems.

“With an increasing trend towards the convergence of IT and industrial IoT, the next cyber battlefield is operational technology" said Mr Love.

“A growing number of groups have displayed interest in compromising operational systems and industrial control systems to potentially prepare for cyber warfare.”

The report also reveals that in in the UAE, email malware attacks have increased year-on-year, double the global average. 
In 2018, one in 183 emails in the UAE had included a malicious attachment or link, whereas the global average was one in 412 emails during the same time period.

The type of cyber-attacks also depends on the company size.  Companies in the UAE with more than 2,500 employees were most likely to be targeted by malware, a software damaging computer networks.  Whereas, medium-sized companies with 500 to 1,000 employees are likely to be most affected by spam emails, unsolicited messages sent in bulk.

The National

You Might Also Read:

Cyber Criminals Are Aiming At Business:

 

 

 

« NATO Defense Spending Should Privilege Cyber
Fake News Prompts International Concern »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Dutch Accreditation Council (RvA)

Dutch Accreditation Council (RvA)

RvA is the national accreditation body for the Netherlands. The directory of members provides details of organisations offering certification services for ISO 27001.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Databarracks

Databarracks

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives.

CloudDefense.AI

CloudDefense.AI

CloudDefense.AI is an industry-leading multi-layered Cloud Native Application and Protection Platform (CNAPP) that safeguards your cloud infrastructure and cloud-native apps,

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.