Worldwide Cyber Security Threats

The last 12 months have seen cyber criminals take advantage of the COVID-19 pandemic and the increase in remote work to step up their attacks, exploiting both technical and human vulnerabilities. 

As attackers increasingly automate attacks, it’s easy for them to target hundreds, if not thousands of small businesses at once. Small businesses often have less stringent technological defences, less awareness of threats and less time and resource to put into cyber security. This makes them an easier target for hackers than bigger organisations.

Cyber security threats, risks and challenges vary significantly around the world from one country to another. 

Here are the top cyber security issues in parts of the world today: 

Africa:   Several African countries have very well-developed mobile digital currency systems with millions of users. People use these for salaries, groceries and transportation in some countries, especially in Kenya. Gangs attack these systems hoping to steal money from customers. While most global vulnerability assessments worry most about data protection, these mobile digital currency systems worry about money protection. 

The urban coastal regions of Africa also face risk from ransomware attempts on ports. Ports in South Africa, for example, saw shutdowns after a serious cyber attack on one of the ports. 

Regional and international tensions in East Africa and elsewhere engender cyber-spying cyber security threats, most recently using Pegasus spyware. As of the end of 2020, some 11 African national governments found Pegasus spyware. They presumed it to be part of spy work from both within the region and from abroad. 

South America:   Latin America is under cyber attack. Cyber attacks are on the rise globally, but Latin America is seeing more than its fair share. There is also low public awareness about cyber crime due to a lack of government programs to educate the public. According to an ESET Latin American Security Report (2017), the number of reported ransomware cases grew 131% in 2016. In Brazil alone, cyber attacks increased 197% in 2015, and a survey of Brazilian companies revealed that one-third had experienced a cyber crime. Many of these use COVID-related social engineering content, according to Trend Micro.

One major strain is fear-mongering COVID-related phishing scams. These aim to collect the information the criminals need to commit insurance and identity fraud. Emails offer stimulus money, access to vaccines and other benefits in exchange for personal information or downloading malware. 

The most heavily targeted countries in Latin America are those with the largest economies: Brazil, Mexico, Colombia and Argentina. 

Mexico has been hit recently by a large malware attack on oil giant Pemex as well as the Ministry of Economy. 
In Latin America and the Caribbean, state-sponsored attacks tend to spike in advance of international treaties, economic summits and other such events.

United States:   The US is targeted for all kinds of cyber security threats, especially very large-scale state-sponsored attacks like the SolarWinds attack. These are long-term and very sophisticated. Attackers could have a wide range of goals, from political and industrial espionage to influencing operations. 

Asia:   Geopolitical tensions in the region drive state-sponsored influence operations, cyber espionage and targeted financial crimes. Phishing attacks remain a common entry point for many cyber attacks across Asia. 
Tensions between countries drive a large number of cyber threats from both nation-state and non-governmental actors in all countries involved. Look at China and India, China and Taiwan, India and Pakistan, North Korea and South Korea and, of course, tensions between the U.S. and China, North Korea and Russia.

Also, much of the world’s electronics supple chain infrastructure is in Asia and the global trend of supply chain attack and disruption is acute in the region.

Electronics exporters, like Vietnam and Malaysia, depend on buyers and manufacturers in China, and vice versa. 
Plus, the world depends on goods made in China. Disrupting any part of this supply chain slows deliveries, raises prices and applies pressure to all concerned. Many of these connections involve cooperation and partnership in public and rivalry in private. Rivalries play out through cyber attacks and espionage.

North Korea deserves particular mention, as that country has a robust state-sponsored cyber-attack apparatus. On the other hand, the country has almost no targets for foreign adversaries to hit back due to the lack of development and internet connectivity there. 

Russia & Turkey:   Turkey and Russia straddle both Europe and Asia. Many global cybersecurity threats, both state-sponsored and criminal, start from Russia in particular. In the past year, according to a report from Microsoft, nearly 60% of the world’s observed state-sponsored attacks started with the Russian government, and one-third of the world’s successful cyber-attacks from non-state actors started there, too. 

The new wave of ransomware-as-a-service attacks is mostly a Russian trend. A disproportionate share of information operations and election-related disinformation campaigns start in Russia as well. 

Europe:   European hospitals have been affected by dangerous ransomware attacks in Ireland, France and elsewhere in a big way. The two French hospitals were attacked within a week, following several previous attacks in 2020, by attackers using the crypto-virus Ryuk. Both were battling COVID-19 and were at high capacity.

The attack on the Irish health service earlier this year disrupted health care nationwide and forced health care workers to resort to using paper records. 

The number of serious cyber attacks effectivley doubled from 2020 to 2021, according to ENISA

Middle East:   The Middle East region has more than its fair share of state-sponsored cybersecurity threats. These aim to disrupt rivals, cause economic hardship and sometimes even cause internal political frictions. An attack in Iran recently, for example, caused major disruptions to consumer petrol sales. In apparent response, people breached gasoline signs criticising the government for the gasoline lines. 

Any vulnerability analysis in the Middle East has to take account of the constant cyber conflict between Israel and its various hostile neighbours.

Many of the types and methods of cyber attacks around the world are similar, with malware and ransomware topping the list. At the same time, the attackers’ goals vary widely. The one thing all of these attacks have in common is that they appear all over the world.

ENISA:       Verizon:     CSIS:     IEEE:    Security Intelligence:     CSO Online:    Expert Insights:  

You Might Also Read: 

International Effort To Reduce Ransomware Attacks:

 

« Tesla Drivers Can’t Unlock Their Cars
Britain Is Fighting A Ransomware Epidemic »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Techmeme

Techmeme

Techmeme is an online news curation service focused on leading edge technology, including cyber security.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

OpenSphere

OpenSphere

OpenSphere is an IT company providing security consultancy, information system risk management and security management services.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.