Worldwide Cyber Security Threats

The last 12 months have seen cyber criminals take advantage of the COVID-19 pandemic and the increase in remote work to step up their attacks, exploiting both technical and human vulnerabilities. 

As attackers increasingly automate attacks, it’s easy for them to target hundreds, if not thousands of small businesses at once. Small businesses often have less stringent technological defences, less awareness of threats and less time and resource to put into cyber security. This makes them an easier target for hackers than bigger organisations.

Cyber security threats, risks and challenges vary significantly around the world from one country to another. 

Here are the top cyber security issues in parts of the world today: 

Africa:   Several African countries have very well-developed mobile digital currency systems with millions of users. People use these for salaries, groceries and transportation in some countries, especially in Kenya. Gangs attack these systems hoping to steal money from customers. While most global vulnerability assessments worry most about data protection, these mobile digital currency systems worry about money protection. 

The urban coastal regions of Africa also face risk from ransomware attempts on ports. Ports in South Africa, for example, saw shutdowns after a serious cyber attack on one of the ports. 

Regional and international tensions in East Africa and elsewhere engender cyber-spying cyber security threats, most recently using Pegasus spyware. As of the end of 2020, some 11 African national governments found Pegasus spyware. They presumed it to be part of spy work from both within the region and from abroad. 

South America:   Latin America is under cyber attack. Cyber attacks are on the rise globally, but Latin America is seeing more than its fair share. There is also low public awareness about cyber crime due to a lack of government programs to educate the public. According to an ESET Latin American Security Report (2017), the number of reported ransomware cases grew 131% in 2016. In Brazil alone, cyber attacks increased 197% in 2015, and a survey of Brazilian companies revealed that one-third had experienced a cyber crime. Many of these use COVID-related social engineering content, according to Trend Micro.

One major strain is fear-mongering COVID-related phishing scams. These aim to collect the information the criminals need to commit insurance and identity fraud. Emails offer stimulus money, access to vaccines and other benefits in exchange for personal information or downloading malware. 

The most heavily targeted countries in Latin America are those with the largest economies: Brazil, Mexico, Colombia and Argentina. 

Mexico has been hit recently by a large malware attack on oil giant Pemex as well as the Ministry of Economy. 
In Latin America and the Caribbean, state-sponsored attacks tend to spike in advance of international treaties, economic summits and other such events.

United States:   The US is targeted for all kinds of cyber security threats, especially very large-scale state-sponsored attacks like the SolarWinds attack. These are long-term and very sophisticated. Attackers could have a wide range of goals, from political and industrial espionage to influencing operations. 

Asia:   Geopolitical tensions in the region drive state-sponsored influence operations, cyber espionage and targeted financial crimes. Phishing attacks remain a common entry point for many cyber attacks across Asia. 
Tensions between countries drive a large number of cyber threats from both nation-state and non-governmental actors in all countries involved. Look at China and India, China and Taiwan, India and Pakistan, North Korea and South Korea and, of course, tensions between the U.S. and China, North Korea and Russia.

Also, much of the world’s electronics supple chain infrastructure is in Asia and the global trend of supply chain attack and disruption is acute in the region.

Electronics exporters, like Vietnam and Malaysia, depend on buyers and manufacturers in China, and vice versa. 
Plus, the world depends on goods made in China. Disrupting any part of this supply chain slows deliveries, raises prices and applies pressure to all concerned. Many of these connections involve cooperation and partnership in public and rivalry in private. Rivalries play out through cyber attacks and espionage.

North Korea deserves particular mention, as that country has a robust state-sponsored cyber-attack apparatus. On the other hand, the country has almost no targets for foreign adversaries to hit back due to the lack of development and internet connectivity there. 

Russia & Turkey:   Turkey and Russia straddle both Europe and Asia. Many global cybersecurity threats, both state-sponsored and criminal, start from Russia in particular. In the past year, according to a report from Microsoft, nearly 60% of the world’s observed state-sponsored attacks started with the Russian government, and one-third of the world’s successful cyber-attacks from non-state actors started there, too. 

The new wave of ransomware-as-a-service attacks is mostly a Russian trend. A disproportionate share of information operations and election-related disinformation campaigns start in Russia as well. 

Europe:   European hospitals have been affected by dangerous ransomware attacks in Ireland, France and elsewhere in a big way. The two French hospitals were attacked within a week, following several previous attacks in 2020, by attackers using the crypto-virus Ryuk. Both were battling COVID-19 and were at high capacity.

The attack on the Irish health service earlier this year disrupted health care nationwide and forced health care workers to resort to using paper records. 

The number of serious cyber attacks effectivley doubled from 2020 to 2021, according to ENISA

Middle East:   The Middle East region has more than its fair share of state-sponsored cybersecurity threats. These aim to disrupt rivals, cause economic hardship and sometimes even cause internal political frictions. An attack in Iran recently, for example, caused major disruptions to consumer petrol sales. In apparent response, people breached gasoline signs criticising the government for the gasoline lines. 

Any vulnerability analysis in the Middle East has to take account of the constant cyber conflict between Israel and its various hostile neighbours.

Many of the types and methods of cyber attacks around the world are similar, with malware and ransomware topping the list. At the same time, the attackers’ goals vary widely. The one thing all of these attacks have in common is that they appear all over the world.

ENISA:       Verizon:     CSIS:     IEEE:    Security Intelligence:     CSO Online:    Expert Insights:  

You Might Also Read: 

International Effort To Reduce Ransomware Attacks:

 

« Tesla Drivers Can’t Unlock Their Cars
Britain Is Fighting A Ransomware Epidemic »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CGI Group

CGI Group

CGI is a leading IT and business process services provider. Services include IT consulting, Systems Integration, Application Development, Infrastructure, Business Processes, Digital IP.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Intaso

Intaso

Intaso are a boutique head hunting and talent solution firm with specialist Cyber and Information Security expertise.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

Sequentur

Sequentur

Sequentur is an award-winning Managed IT Services company. We are SOC 2 certified and provide Managed IT Services and Cybersecurity services to businesses nationwide.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.