WEF Report Confirms Cyber Attack Risk Is Growing Worldwide

Cybercattacks represent the greatest risk in six out of ten of the top economies in the world and not just in the United States but world-wide. Attacks are growing in every business sector and all organisations need to manage cyber risks and threats. 

A new report from the World Economic Forum discusses form-jacking, crypto-jacking, ransomware like LockerGoga and other cyber-attacks of which CEOs around the globe are starting to become more aware. 

These different types of attacks break out as malicious code designed to steal monetary or physical assets from consumers and businesses. They’re also becoming more serious as time passes by. They cost companies around 12% more in damages in 2018 than in 2017. This should force executives to pay more attention to technical experts on staff during board meetings.

According to this report, India is the only country listed in the top seven global economies that has dropped cyber-attacks off of their top five risks. What is particularly troubling is that the attack went unreported for months and that the tools and techniques used by the malicious actors consisted of reused tools from 2015 and 2017 attacks. A phishing attack laid the groundwork for bad actors to establish a foothold. These attackers then took control of internal systems and used open-source tools to build upon and sustain their access.

Form-Jacking
With the boom in online marketplaces, it’s no surprise the cyber-attacks have risen in prevalence. Symantec in 2018 identified form-jacking as the process of intercepting payment forms and collecting data on retail websites. The issue spiked between August 2018 and September 2018 when Symantec reported on around 248,000 form-jacking attempts. In an attempt to determine patterns in the attacks, Symantec pulled 1,000 instances over a course of three days and discovered 57 websites were attacked across those attempts. The attacked sites were located all over the world and ranged in size from small businesses to global retailers.

One of the bigger hacking groups that uses form-jacking to gain information is a group called Magecart. In 2018, the group launched a campaign against British Airways, Ticketmaster, Feedify and Newegg. 

Interestingly enough, the lure to these companies was again the presence of a lot of third-party service providers. The reason for this is shared network infrastructure points where a third-party vendor may offer a weaker defense than the intended organisation. Companies who use services provided by third-party vendors are often forced to allow some network sharing.


A major example of this was evident in the Target breach of 2013. Target relied on a third-party company to manage heating, ventialtion a nd air-conditioning (HVAC) services. The security or training advisement was weaker on behalf of the third party. However, there was a linked portal allowing that vendor to access Target’s internal system. It could be that this attack’s ideology stems from successes in previous major security breaches of the past. 

When security requirements are a shared responsibility, more points of vulnerability often present themselves.

Crypto Jacking Malware
Crypto jacking was another point of note from the article as a rising cyber threat in the business realm. This attack is unique in its purpose. Machines that are breached are not sought out for their stored data but for their computing resources to aid in the mining of crypto currency. 

The hack is performed in a traditional manner by running malicious code on the target device or using a web application infection to load mining software on the victim’s machine. This attack vector should be troubling to major businesses worldwide, as hackers have begun to view these attacks as having more reward than risk.

As an alternative to crypto jacking, hacker groups can simply demand payments in cryptocurrency using ransomware. Crypto-malware is not a guaranteed payoff, and companies are increasingly embracing the idea of backing up data regularly and ensuring backup sites are ready to go should a breach take place. 

LockerGoga Ransomware
For the many businesses in 2019, an important cyber boogeyman was a ransomware family identified as LockerGoga. This was especially true for industrial and manufacturing firms with large stakes on the table. This year, French, Norwegian and American companies faced down this ransomware strain. FireEye told Wired that it has dealt with five or more attacks within the industrial and manufacturing sector.

What is most alarming about LockerGoga is the fact that there is no definitive determination on how hackers are initially gaining access to victim’s machines. 

Attackers seem to have credentials that grant them network access and hey can gain these details through traditional efforts by implementing social engineering tactics, purchasing credentials from hacker markets and phishing. The reason for concern to the industrial sector is the physical risks associated with that sector. Limiting control of systems and subsystems in that industry could have a direct impact for workers’ lives and environmental variables. From the reports provided by different regions, it seems that money is not always the biggest motivator for cyber-attacks. At the national level in each of these economies, political motives may have been present, as well. 

As the world moves to a more globalised economy working with each other, politicians’ relationships play a large part. Corrupt state-sponsored hacking groups with the power to infiltrate adversary federal governments may use that power to launch influence elections or even the economy in some cases. 

This can be done by holding independent businesses hostage in extortion-based cyberattacks or through social media marketing campaigns.

US federal organisations have been investigating Russian actors for “meddling” in the 2016 United States presidential election and that fear alone has changed how organisations responsible for voter-processes are preparing the presidential elections coming in 2020. Looking abroad, Canada could very well see significant cyber influence from foreign parties in their 2019 federal election. 

The problem stretches to Europe, as well, with public interference occurring in Germany, Finland, Croatia and the Czech Republic.

Some key findings from the report are similar to the main points of 2018 study. For that publication, 141 economies had the chance to choose among 30 options as the most significant risks facing them. From these 30 risks, 48 countries listed cyberattacks within their top five risks. Globally, cyberattacks rose from the fifth highest risk in 2018 to the second highest risk in 2019, topping national governance failures, unemployment and energy price shock.

According to the report, the top seven economies are China, France, Germany, Japan, India, the United Kingdom and the United States, not in that order. Six of the seven nations reported cyberattacks as one of their top five risks. Many of the solutions to the problems outlined by the report come down to being informed.

It is estimated that somewhere around 90% of all cyber shortcomings stem from a lack of knowledge and human error. 

For that other 10%, they should consider deploying detection devices to monitor traffic for anomalies in behavior, firewalling and abiding by common cyber security practices. 

Even for the tools mentioned that operate in the background at the packet level, even the best malware cannot always obfuscate activity. Smart detection devices in place can alert security teams to network maliciousness and aid in prevention and/or recovery from big data breaches.

For free Cyber training advice and information please contact Cyber Security Intelligence

World Economic Forum:        Tripwire:   

You Might Also Read:

World Economic Forum Cyber Risks Report:

 

« Cyber Insurance Might Actually Encourage Attacks
Artificial Intelligence & The Ethics Of War »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

National Association of Software and Services Companies (NASSCOM) - India

National Association of Software and Services Companies (NASSCOM) - India

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

TheGreenBow

TheGreenBow

TheGreenBow is a trusted VPN software company. We help organizations and individuals become cyber-responsible. For this, we design and develop reliable and easy-to-use solutions.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

Accelerynt

Accelerynt

Accelerynt was founded with a singular purpose: help teams like yours build cybersecurity resilience.

Vernetzen

Vernetzen

Vernetzen is an industrial network and cybersecurity innovator focused on delivering practical solutions to connect and secure industry across the globe.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.

Unosecur

Unosecur

Unosecur is a comprehensive identity security platform that addresses identity-related threats in multi-cloud and on-premise environments.