Falling Returns Mean Cyberecriminals Are Turning To Unconventional Methods

Falling returns from cyber-attacks are forcing criminals to use unconventional methods to extort money as internet users become more savvy and incidents of crimes decline, a report from Symantec has found.

Primarily due to increased awareness, for the first time since 2013, ransomware incidents fell by 20 per cent last year. Ransomware is a breached software that threatens to publish the victim's data or permanently block access for them unless a ransom is paid.

More than 4,800 websites are compromised globally each month with a type of hacking called form-jacking, in which a malicious code is added to retailers’ websites to steal bank card details of shoppers, according Symantec.

“Globally, one in 344 form-jacking attacks were blocked in the UAE, representing a serious threat for both local businesses and consumers,” said Gordon Love, vice president of Europe, Middle East and Africa emerging region at Symantec.

Consumers have no way to know if they are visiting a breached online retailer without using a comprehensive security solution, leaving valuable personal and financial information vulnerable, he added. Only 10 credit cards stolen from each of the 4,800 compromised websites every month could yield up to $2.2 million each, according to Symantec’s report, adding that attackers are increasingly focusing on Internet of Things as an entry point to technical systems.

“With an increasing trend towards the convergence of IT and industrial IoT, the next cyber battlefield is operational technology" said Mr Love.

“A growing number of groups have displayed interest in compromising operational systems and industrial control systems to potentially prepare for cyber warfare.”

The report also reveals that in in the UAE, email malware attacks have increased year-on-year, double the global average. 
In 2018, one in 183 emails in the UAE had included a malicious attachment or link, whereas the global average was one in 412 emails during the same time period.

The type of cyber-attacks also depends on the company size.  Companies in the UAE with more than 2,500 employees were most likely to be targeted by malware, a software damaging computer networks.  Whereas, medium-sized companies with 500 to 1,000 employees are likely to be most affected by spam emails, unsolicited messages sent in bulk.

The National

You Might Also Read:

Cyber Criminals Are Aiming At Business:

 

 

 

« NATO Defense Spending Should Privilege Cyber
Fake News Prompts International Concern »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Industrial Cybersecurity Center (CCI)

Industrial Cybersecurity Center (CCI)

CCI is the first center of its kind that comes from industry without subsidies, independent and non-profit, to promote and contribute to the improvement of Industrial Cybersecurity.

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.