Worldwide Cyber Security Threats

The last 12 months have seen cyber criminals take advantage of the COVID-19 pandemic and the increase in remote work to step up their attacks, exploiting both technical and human vulnerabilities. 

As attackers increasingly automate attacks, it’s easy for them to target hundreds, if not thousands of small businesses at once. Small businesses often have less stringent technological defences, less awareness of threats and less time and resource to put into cyber security. This makes them an easier target for hackers than bigger organisations.

Cyber security threats, risks and challenges vary significantly around the world from one country to another. 

Here are the top cyber security issues in parts of the world today: 

Africa:   Several African countries have very well-developed mobile digital currency systems with millions of users. People use these for salaries, groceries and transportation in some countries, especially in Kenya. Gangs attack these systems hoping to steal money from customers. While most global vulnerability assessments worry most about data protection, these mobile digital currency systems worry about money protection. 

The urban coastal regions of Africa also face risk from ransomware attempts on ports. Ports in South Africa, for example, saw shutdowns after a serious cyber attack on one of the ports. 

Regional and international tensions in East Africa and elsewhere engender cyber-spying cyber security threats, most recently using Pegasus spyware. As of the end of 2020, some 11 African national governments found Pegasus spyware. They presumed it to be part of spy work from both within the region and from abroad. 

South America:   Latin America is under cyber attack. Cyber attacks are on the rise globally, but Latin America is seeing more than its fair share. There is also low public awareness about cyber crime due to a lack of government programs to educate the public. According to an ESET Latin American Security Report (2017), the number of reported ransomware cases grew 131% in 2016. In Brazil alone, cyber attacks increased 197% in 2015, and a survey of Brazilian companies revealed that one-third had experienced a cyber crime. Many of these use COVID-related social engineering content, according to Trend Micro.

One major strain is fear-mongering COVID-related phishing scams. These aim to collect the information the criminals need to commit insurance and identity fraud. Emails offer stimulus money, access to vaccines and other benefits in exchange for personal information or downloading malware. 

The most heavily targeted countries in Latin America are those with the largest economies: Brazil, Mexico, Colombia and Argentina. 

Mexico has been hit recently by a large malware attack on oil giant Pemex as well as the Ministry of Economy. 
In Latin America and the Caribbean, state-sponsored attacks tend to spike in advance of international treaties, economic summits and other such events.

United States:   The US is targeted for all kinds of cyber security threats, especially very large-scale state-sponsored attacks like the SolarWinds attack. These are long-term and very sophisticated. Attackers could have a wide range of goals, from political and industrial espionage to influencing operations. 

Asia:   Geopolitical tensions in the region drive state-sponsored influence operations, cyber espionage and targeted financial crimes. Phishing attacks remain a common entry point for many cyber attacks across Asia. 
Tensions between countries drive a large number of cyber threats from both nation-state and non-governmental actors in all countries involved. Look at China and India, China and Taiwan, India and Pakistan, North Korea and South Korea and, of course, tensions between the U.S. and China, North Korea and Russia.

Also, much of the world’s electronics supple chain infrastructure is in Asia and the global trend of supply chain attack and disruption is acute in the region.

Electronics exporters, like Vietnam and Malaysia, depend on buyers and manufacturers in China, and vice versa. 
Plus, the world depends on goods made in China. Disrupting any part of this supply chain slows deliveries, raises prices and applies pressure to all concerned. Many of these connections involve cooperation and partnership in public and rivalry in private. Rivalries play out through cyber attacks and espionage.

North Korea deserves particular mention, as that country has a robust state-sponsored cyber-attack apparatus. On the other hand, the country has almost no targets for foreign adversaries to hit back due to the lack of development and internet connectivity there. 

Russia & Turkey:   Turkey and Russia straddle both Europe and Asia. Many global cybersecurity threats, both state-sponsored and criminal, start from Russia in particular. In the past year, according to a report from Microsoft, nearly 60% of the world’s observed state-sponsored attacks started with the Russian government, and one-third of the world’s successful cyber-attacks from non-state actors started there, too. 

The new wave of ransomware-as-a-service attacks is mostly a Russian trend. A disproportionate share of information operations and election-related disinformation campaigns start in Russia as well. 

Europe:   European hospitals have been affected by dangerous ransomware attacks in Ireland, France and elsewhere in a big way. The two French hospitals were attacked within a week, following several previous attacks in 2020, by attackers using the crypto-virus Ryuk. Both were battling COVID-19 and were at high capacity.

The attack on the Irish health service earlier this year disrupted health care nationwide and forced health care workers to resort to using paper records. 

The number of serious cyber attacks effectivley doubled from 2020 to 2021, according to ENISA

Middle East:   The Middle East region has more than its fair share of state-sponsored cybersecurity threats. These aim to disrupt rivals, cause economic hardship and sometimes even cause internal political frictions. An attack in Iran recently, for example, caused major disruptions to consumer petrol sales. In apparent response, people breached gasoline signs criticising the government for the gasoline lines. 

Any vulnerability analysis in the Middle East has to take account of the constant cyber conflict between Israel and its various hostile neighbours.

Many of the types and methods of cyber attacks around the world are similar, with malware and ransomware topping the list. At the same time, the attackers’ goals vary widely. The one thing all of these attacks have in common is that they appear all over the world.

ENISA:       Verizon:     CSIS:     IEEE:    Security Intelligence:     CSO Online:    Expert Insights:  

You Might Also Read: 

International Effort To Reduce Ransomware Attacks:

 

« Tesla Drivers Can’t Unlock Their Cars
Britain Is Fighting A Ransomware Epidemic »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

EK3 Technologies

EK3 Technologies

EK3 Technologies mission is to provide comprehensive cybersecurity and IT solutions that allow our clients to focus on sustaining their business.

National Cyber Force (NCF)

National Cyber Force (NCF)

The National Cyber Force (NCF) is a partnership between defence and intelligence.