Connect with us

Hi, what are you looking for?

HEADLINES

Every two in three businesses in SEA are ransomware victims – Kaspersky study 

Only 5% of the C-suite confirms the presence of an internal or a third-party incident response team, showing the need to fill the gap in the detection and response capabilities of enterprises in SEA.

Ever since the infamous Wannacry attack, ransomware has become something of a buzzword within the corporate world, with large attacks on enterprises appearing in headlines month after month. Businesses in Southeast Asia (SEA) are well within the radar of these cybercriminals with three in five (67%) confirming that they have been victims, according to the latest research by Kaspersky.

Global cybersecurity company, Kaspersky, surveyed 900 respondents across North America, South America, Africa, Russia, Europe, and Asia-Pacific, 100 of which were from SEA. Conducted in April 2022, the research titled “How business executives perceive ransomware threat” gathered the answers from those in senior non-IT management (such as CEOs, VP, and Director level) and business owners or partners at companies with 50-1000 employees.

Half of those (34%) who have admitted having their data maliciously encrypted by cybercriminals experienced ransomware attacks not once but several times. The remaining respondents (33%) said they have experienced such incidents one-time only.

The most common denominator among ransomware victims in the region is that almost all paid the ransom (82.1%). In fact, 47.8% of the surveyed executives confessed that they paid the ransom as soon as possible for immediate access to their business data, two digits higher than the global average of 38.1%.

Almost a quarter (23.9%) did try to get their data back through back-ups or decryption but failed and paid ransom within two days while 10.4% took a week of effort before paying up.

Advertisement. Scroll to continue reading.

 When the ransomware victims were asked of the steps they will conduct should they face the same incident, majority (77%) of the business leaders in SEA confirmed that they will still pay the ransom showing a worrying tendency for companies that have already been a victim of ransomware to pay up, encouraging cybercriminals to continue their attacks.

“It is concerning to see that only 17.9% of businesses here in SEA victimized by ransomware did not budge on the cybercriminals’ demands. We stand firm that paying the ransom should not be a knee jerk reaction for enterprises. But, with more than half (67%) of those we surveyed admitting that their organizations would not survive without business data if attacked, we understand the urgency and the desperation to get their data back as soon as possible, by all means,” comments Yeo Siang Tiong, General Manager for Southeast Asia at Kaspersky. 

Kaspersky’s study also revealed a key puzzle piece – that the majority (94%) of enterprises in SEA will seek external help if attacked by ransomware. This is a tad higher than the global rate at 89.9%.

Almost a quarter (20%) of which will contact the law enforcement, while 29% will reach out to a third party cybersecurity incident investigation and response service provider like Kaspersky. The remaining percent will contact both of these external organizations to know how to respond to a ransomware attack.

“With only 5% of enterprise leaders confirming that they have internal incident response capabilities or they have the regular IT team or service provider to figure out a ransomware attack, it is clear that our enterprises here in SEA need help. We advocate for cross-border and public-and-private cooperation that will help governments and companies to combat threats like ransomware. However, such is not the only answer. Enterprises here should really look into acting on concrete steps to upskill or even to build their own security defense team with intelligence-led incident detection and response capabilities,” adds Yeo.

Advertisement. Scroll to continue reading.

Global cybersecurity company Kaspersky co-founded the global project called “No More Ransom Initiative” which has grown from four partners to 188 and has contributed 136 decryption tools covering 165 ransomware families.

Since its launch in 2016, it has helped more than 1.5 million people decrypt their devices all over the world. Nearly 30,000 ransomware victims from July last year to June end of 2022 in SEA were also able to retrieve their data through this project.

The project is done by Kaspersky along with the National High Tech Crime Unit of the Dutch National Police, Europol’s European Cybercrime Center, and other partners.

Kaspersky, however, puts emphasis on preventing a ransomware attack. The global cybersecurity company encourages businesses to follow these simple and effective recommendations to help protect their organizations against this threat:

  • Always keep up-to-date copies of your files so you can replace them in case they are lost (e.g. due to malware or a broken device). These should be stored not only on a physical device but also in cloud storage for greater reliability. Make sure you can quickly access your backups in the event of an emergency.
  • Install all security updates as soon as they become available. Always update your operating system and software to eliminate recent vulnerabilities.
  • Provide security education to your staff. Explain that by following simple rules, employees can help prevent ransomware incidents. Check out dedicated training courses, such as the ones provided in the Kaspersky Automated Security Awareness Platform.
  • Enable ransomware protection for all endpoints. There is a free Kaspersky Anti-Ransomware Tool for Business that shields computers and servers from ransomware and other types of malware, prevents exploits and is compatible with already installed security solutions.
  • Enterprise companies are recommended to use anti-APT and EDR solutions, enabling capabilities for advanced threat discovery and detection, investigation and timely remediation of incidents, as well as to have access to the latest threat intelligence. An MDR provider could help to effectively hunt any advanced ransomware attack. All of the above is available within Kaspersky Expert Security.

If you become a victim, never pay the ransom. It won’t guarantee you get your data back but will encourage criminals to continue their business. Instead, report the incident to your local law enforcement agency and get help from incident response experts such as Kaspersky.

Companies can also try to find a decryptor on the internet – some of these are available at https://www.nomoreransom.org/en/index.html.

Advertisement. Scroll to continue reading.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

When compared to 2023, Sophos saw a 51% increase in abusing “Living off the Land” binaries or LOLbins; since 2021, it’s increased by 83%.

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

HEADLINES

There was a 121% Year-on-Year (YoY) increase in identity fraud in 2024 across the region, with significant surges recorded in Singapore (207%), Thailand (206%)...

HEADLINES

As part of RCBC’s 2024 Cybersecurity literacy program, the webinar aims to help Filipinos level up their online banking safety by providing them with...

White Papers

The survey found that CXO’s feel less prepared than their global peers. Less than half or 48% in APAC said they felt completely prepared...

HEADLINES

On average, a single organization in the Philippines experiences 4,003 attacks per week, significantly higher than the APAC average of 2,870 attacks per week.

White Papers

Exploiting this vulnerability, cybercriminals craft deceptively authentic phishing emails that align with current trends, exploiting human emotions to invoke urgency and trick recipients into...

Advertisement