Connect with us

Hi, what are you looking for?

HEADLINES

Ransomware 2.0 employs ‘pressure tactic’ to prey on organizations’ digital reputation in APAC

Vitaly Kamluk, Director of Global Research and Analysis Team (GReAT) for APAC at Kaspersky, revealed that at least 61 entities from the region were breached by a targeted ransomware group in 2020. Australia and India logged the highest number of incidents across APAC.

Global cybersecurity company Kaspersky recently revealed in a virtual conference that 2020’s cybersecurity “disease” is targeted ransomware. Also dubbed as “Ransomware 2.0”, this type of attack goes beyond kidnapping a company’s or an organization’s data. These groups are now utilizing the increasingly valued digital reputation to force their preys to pay hefty ransom.

Vitaly Kamluk, Director of Global Research and Analysis Team (GReAT) for APAC at Kaspersky, revealed that at least 61 entities from the region were breached by a targeted ransomware group in 2020. Australia and India logged the highest number of incidents across APAC. 

In terms of industries, Kaspersky’s data shows that the following segments were compromised:

  • Light Industry – includes the manufacturing of clothes, shoes, furniture, consumer electronics and home appliances
  • Public service
  • Media and Technology
  • Heavy Industry – includes oil, mining, shipbuilding, steel, chemicals, machinery manufacturing
  • Consulting
  • Finance
  • Logistics
C:\Users\gonzales_r\AppData\Local\Microsoft\Windows\INetCache\Content.Word\Kaspersky_Targeted ransomware APAC.png

“Targeted ransomware has been a problem for many Asian enterprises. Over 61 companies were breached this way in Asia alone. In some cases, Maze ransomware gang claimed responsibility and published stolen data from the compromised companies,” said Kamluk.

Maze group stands out as the most active and the most damaging of all. Formed in summer 2019, it took them about half a year to prepare and launch a full scale campaign against many businesses. The first victims appeared in November 2019, when they leaked 700MB of victim’s internal data online. 

Advertisement. Scroll to continue reading.

Many other cases followed and within a year Maze breached at least 334 companies and organizations. This is one of the first groups which started the use of “pressure tactic”. This refers to cybercriminals threatening victims that they will publicly leak most sensitive data stolen from their compromised systems via the group’s own website.

“Pressure tactic is a serious threat to public and private organizations. This attack plays on companies’ digital reputation as it threatens to divulge data of a breached entity, compromising its security and its name at the same time,” he added.

Kamluk noted that digitalization has birthed different pressure points for a company. Before, enterprises’ main concerns only included business continuity and, depending on the industry, government regulation. Now, surviving in the era of digital reputation economy means that they should also be aware of business trust – with their partners and customers – as well as public opinion.

A recent survey conducted by Kaspersky proved Vitaly’s points. Results showed that 51% of users in APAC agree that a company’s online reputation is essential. Almost half (48%) also admitted that they avoid companies who were involved in a scandal or had received negative news coverage online.

“Maze group just announced that they are closing down, but this gang just triggered the beginning of this trend. A successful targeted ransomware attack is a PR crisis which can damage an organization’s reputation, online and offline. Financial toll aside, fixing one’s name is quite a harder task to take which is why we urge public and private entities to take their security seriously,” adds Kamluk.

Advertisement. Scroll to continue reading.

To remain protected against these threats, Kamluk suggests enterprises and organizations to:

  • Stay ahead of your enemy: make backups, simulate attacks, prepare action plans for disaster recovery.
  • Deploy sensors everywhere: monitor software activity on endpoints, record traffic, check hardware integrity.
  • Never follow demands of the criminals. Do not fight alone – contact Law Enforcement, CERT, security vendors like Kaspersky.
  • Train your staff while they work remotely: digital forensics, basic malware analysis, PR crisis management.
  • Follow the latest trends via premium threat intelligence subscriptions, like Kaspersky APT Intelligence Service.
  • Know your enemy: identify new undetected malware on premises with Kaspersky Threat Attribution Engine.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The attackers used a series of campaigns with novel exploits and customized malware to embed tools to conduct surveillance, sabotage and cyberespionage as well...

HEADLINES

Financial phishing attacks are rapidly increasing in the country as cybercriminals continuously evolve and adapt their tactics, making them sophisticated. The number of attacks...

HEADLINES

A Scale of Harm study by the International Justice Mission revealed that almost half a million Filipino children were trafficked to produce new child...

HEADLINES

Yondu launched an extensive, month-long cybersecurity awareness campaign focused on modern threat detection, incident response, and social engineering defense.

ELECTRONICS

Philips EasyKey partnered with Megaworld and equipped their world-class properties with only the best-in-class smart locks we have on offer, the Philips EasyKey 9300.

HEADLINES

The PLDT wireless unit is also calling on customers to report these messages to Smart’s HULISCAM portal for further action.

HEADLINES

Here are some tips from Sophos for staying secure online during the cybersecurity awareness month.

HEADLINES

While only 21% of hackers believed that AI technologies enhance the value of hacking in 2023, 71% reported it to have value in 2024....

Advertisement