Falling Returns Mean Cyberecriminals Are Turning To Unconventional Methods

Falling returns from cyber-attacks are forcing criminals to use unconventional methods to extort money as internet users become more savvy and incidents of crimes decline, a report from Symantec has found.

Primarily due to increased awareness, for the first time since 2013, ransomware incidents fell by 20 per cent last year. Ransomware is a breached software that threatens to publish the victim's data or permanently block access for them unless a ransom is paid.

More than 4,800 websites are compromised globally each month with a type of hacking called form-jacking, in which a malicious code is added to retailers’ websites to steal bank card details of shoppers, according Symantec.

“Globally, one in 344 form-jacking attacks were blocked in the UAE, representing a serious threat for both local businesses and consumers,” said Gordon Love, vice president of Europe, Middle East and Africa emerging region at Symantec.

Consumers have no way to know if they are visiting a breached online retailer without using a comprehensive security solution, leaving valuable personal and financial information vulnerable, he added. Only 10 credit cards stolen from each of the 4,800 compromised websites every month could yield up to $2.2 million each, according to Symantec’s report, adding that attackers are increasingly focusing on Internet of Things as an entry point to technical systems.

“With an increasing trend towards the convergence of IT and industrial IoT, the next cyber battlefield is operational technology" said Mr Love.

“A growing number of groups have displayed interest in compromising operational systems and industrial control systems to potentially prepare for cyber warfare.”

The report also reveals that in in the UAE, email malware attacks have increased year-on-year, double the global average. 
In 2018, one in 183 emails in the UAE had included a malicious attachment or link, whereas the global average was one in 412 emails during the same time period.

The type of cyber-attacks also depends on the company size.  Companies in the UAE with more than 2,500 employees were most likely to be targeted by malware, a software damaging computer networks.  Whereas, medium-sized companies with 500 to 1,000 employees are likely to be most affected by spam emails, unsolicited messages sent in bulk.

The National

You Might Also Read:

Cyber Criminals Are Aiming At Business:

 

 

 

« NATO Defense Spending Should Privilege Cyber
Fake News Prompts International Concern »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Tanium

Tanium

Tanium delivers Autonomous Endpoint Management (AEM) with the industry’s only true real-time platform for AI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

Clario Tech

Clario Tech

Clario is a simple, comprehensive, personalized protection app. It comes with a full suite of intelligent security software and intelligent people to help you live a better, safer digital life.

Raonsecure

Raonsecure

Raonsecure is one of Korea’s leading ICT security software companies – providing a variety of PC and mobile security solutions to financial institutions, government, and enterprise.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.

Cyberscore

Cyberscore

CyberScore specialize in digital security assessments that preventively make digital environments safer against malicious attacks from inside and outside.