Connect with us

Hi, what are you looking for?

HEADLINES

Ransomware 2.0 employs ‘pressure tactic’ to prey on organizations’ digital reputation in APAC

Vitaly Kamluk, Director of Global Research and Analysis Team (GReAT) for APAC at Kaspersky, revealed that at least 61 entities from the region were breached by a targeted ransomware group in 2020. Australia and India logged the highest number of incidents across APAC.

Global cybersecurity company Kaspersky recently revealed in a virtual conference that 2020’s cybersecurity “disease” is targeted ransomware. Also dubbed as “Ransomware 2.0”, this type of attack goes beyond kidnapping a company’s or an organization’s data. These groups are now utilizing the increasingly valued digital reputation to force their preys to pay hefty ransom.

Vitaly Kamluk, Director of Global Research and Analysis Team (GReAT) for APAC at Kaspersky, revealed that at least 61 entities from the region were breached by a targeted ransomware group in 2020. Australia and India logged the highest number of incidents across APAC. 

In terms of industries, Kaspersky’s data shows that the following segments were compromised:

  • Light Industry – includes the manufacturing of clothes, shoes, furniture, consumer electronics and home appliances
  • Public service
  • Media and Technology
  • Heavy Industry – includes oil, mining, shipbuilding, steel, chemicals, machinery manufacturing
  • Consulting
  • Finance
  • Logistics
C:\Users\gonzales_r\AppData\Local\Microsoft\Windows\INetCache\Content.Word\Kaspersky_Targeted ransomware APAC.png

“Targeted ransomware has been a problem for many Asian enterprises. Over 61 companies were breached this way in Asia alone. In some cases, Maze ransomware gang claimed responsibility and published stolen data from the compromised companies,” said Kamluk.

Maze group stands out as the most active and the most damaging of all. Formed in summer 2019, it took them about half a year to prepare and launch a full scale campaign against many businesses. The first victims appeared in November 2019, when they leaked 700MB of victim’s internal data online. 

Advertisement. Scroll to continue reading.

Many other cases followed and within a year Maze breached at least 334 companies and organizations. This is one of the first groups which started the use of “pressure tactic”. This refers to cybercriminals threatening victims that they will publicly leak most sensitive data stolen from their compromised systems via the group’s own website.

“Pressure tactic is a serious threat to public and private organizations. This attack plays on companies’ digital reputation as it threatens to divulge data of a breached entity, compromising its security and its name at the same time,” he added.

Kamluk noted that digitalization has birthed different pressure points for a company. Before, enterprises’ main concerns only included business continuity and, depending on the industry, government regulation. Now, surviving in the era of digital reputation economy means that they should also be aware of business trust – with their partners and customers – as well as public opinion.

A recent survey conducted by Kaspersky proved Vitaly’s points. Results showed that 51% of users in APAC agree that a company’s online reputation is essential. Almost half (48%) also admitted that they avoid companies who were involved in a scandal or had received negative news coverage online.

“Maze group just announced that they are closing down, but this gang just triggered the beginning of this trend. A successful targeted ransomware attack is a PR crisis which can damage an organization’s reputation, online and offline. Financial toll aside, fixing one’s name is quite a harder task to take which is why we urge public and private entities to take their security seriously,” adds Kamluk.

Advertisement. Scroll to continue reading.

To remain protected against these threats, Kamluk suggests enterprises and organizations to:

  • Stay ahead of your enemy: make backups, simulate attacks, prepare action plans for disaster recovery.
  • Deploy sensors everywhere: monitor software activity on endpoints, record traffic, check hardware integrity.
  • Never follow demands of the criminals. Do not fight alone – contact Law Enforcement, CERT, security vendors like Kaspersky.
  • Train your staff while they work remotely: digital forensics, basic malware analysis, PR crisis management.
  • Follow the latest trends via premium threat intelligence subscriptions, like Kaspersky APT Intelligence Service.
  • Know your enemy: identify new undetected malware on premises with Kaspersky Threat Attribution Engine.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

When compared to 2023, Sophos saw a 51% increase in abusing “Living off the Land” binaries or LOLbins; since 2021, it’s increased by 83%.

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

HEADLINES

There was a 121% Year-on-Year (YoY) increase in identity fraud in 2024 across the region, with significant surges recorded in Singapore (207%), Thailand (206%)...

HEADLINES

As part of RCBC’s 2024 Cybersecurity literacy program, the webinar aims to help Filipinos level up their online banking safety by providing them with...

White Papers

The survey found that CXO’s feel less prepared than their global peers. Less than half or 48% in APAC said they felt completely prepared...

HEADLINES

On average, a single organization in the Philippines experiences 4,003 attacks per week, significantly higher than the APAC average of 2,870 attacks per week.

White Papers

Exploiting this vulnerability, cybercriminals craft deceptively authentic phishing emails that align with current trends, exploiting human emotions to invoke urgency and trick recipients into...

Advertisement