fbpx
Connect with us

Subscribe

Microsoft

Malaysia Experienced General Decline In Cybercrime Encounters

Cybercriminals shifting focus to COVID-19 themed attacks: Microsoft Security Endpoint Threat Report 2019

  • Microsoft Threat Protection Intelligence team warns that cybercriminals are taking advantage of COVID-19 concerns, adapting, and updating attack methods  

Microsoft today unveiled Asia Pacific findings from the latest edition of its Security Endpoint Threat Report 2019, which revealed a decrease in cyberthreat encounters in Malaysia, across cryptocurrency mining, malware and ransomware encounters and drive-by download attacks, in the last year. 

Findings were derived from an analysis of diverse Microsoft data sources, including 8 trillion threat signals received and analyzed by Microsoft every day, covering a 12-month period, from January to December 2019. 

“As security defenses evolve and attackers rely on new techniques, Microsoft’s unique access to billions of threat signals every day enables us to gather data and insights to inform our response to cyberattacks,” said Mary Jo Schrade, Assistant General Counsel, Microsoft Digital Crimes Unit, Microsoft Asia. 

“The Microsoft Security Endpoint Threat report aims to create a better understanding of the evolving threat landscape and help organizations improve their cybersecurity posture by mitigating the effects of increasingly sophisticated attacks.”

Malware and ransomware encounters continue to decline year on year 

According to the report, Asia Pacific continues to experience a higher-than-average encounter rate for malware and ransomware attacks – 1.6 and 1.7 times higher than the rest of the world, respectively.

Malaysia’s malware encounter rate decreased by 36 percent and stood at 4.81 percent. This was the 8th highest encounter rate across the region, and 1.1 times lower than the regional average. Ransomware encounters decreased by 40 percent and stood at 0.06 percent. This was the 7th highest encounter rate, across the region, and 1.2 times higher than the regional average. 

“Despite a reduction in the number of encounters, cyberattacks remain a serious threat to organizations across Malaysia,” said Dato’ Ts. Dr. Haji Amirudin Bin Abdul Wahab, Chief Executive Officer of CyberSecurity Malaysia. “With the announcement of the Movement Control Order (MCO) in March, we saw a shift to remote working, leveraging technology to sustain business continuity. This shift simultaneously demands attention to cybersecurity, which many organizations have taken very seriously. The Security Endpoint Threat report findings provide valuable insight and understanding for organizations to leverage as they continue to work in a digital environment moving forward.”

“Often, high malware encounters correlate with both piracy rates and overall cyber hygiene, that includes regular patching and updating of software.  Countries that have higher piracy rates and lower cyber hygiene tend to be more severely impacted by cyberthreats. Patching, using legitimate software, and keeping it updated can decrease the likelihood of malware and ransomware infections,” explained Dr. Dzahar Mansor, National Technology Officer, Microsoft Malaysia.

Cryptocurrency mining encounter rate on par with global and regional average

Malaysia recorded a 69 percent decrease in cryptocurrency mining encounter rate, from 0.16 in 2018 to 0.05 in 2019. This was the 7th highest encounter rate across the region, on par with both the regional and global average. During such attacks, victims’ computers are infected with cryptocurrency mining malware, allowing criminals to leverage the computing power of their computers without their knowledge.

On the declining encounter rate recorded, Dato’ Dr. Amirudin elaborated, “Cybercriminals are usually incentivized by quick financial gains. The recent fluctuations in the value of cryptocurrency and the increased time required to generate it has perhaps led to them focusing on other forms of cybercrime.”  

Drive-by attack volume in Malaysia was twice as low as the global and regional average

The drive-by download attack volume in Asia Pacific has converged with the rest of the world at 0.08, declining by 27 percent from 2018. Malaysia experienced a significant decrease in drive-by download attack volume, by 93 percent, which stood at 0.04 in 2019. This was the 9th highest attack volume across the region, and two times lower than the regional and global average. 

These attacks involve downloading malicious code onto an unsuspecting user’s computer when they visit a website or fill up a form. The malicious code that is downloaded is then used by an attacker to steal passwords or financial information. Despite the general decline in drive-by download attacks across the region, the study found that regional business hubs, Singapore and Hong Kong, recorded the highest attack volume in 2019, over three times the regional and global average. 

“We usually see cybercriminals launch such attacks to steal financial information or intellectual property. This is a likely reason why regional financial hubs recorded the highest volume of such threats. The high attack volume in these markets may not necessarily translate into a high infection rate, perhaps due to their good cyber hygiene practices and use of genuine software,” explained Dr. Dzahar.

Cybersecurity in the age of COVID-19 

With the turn of the new year, COVID-19 has changed the landscape and remains the top-of-mind concern for individuals, organizations, and governments around the world. Since the outbreak, Microsoft Intelligence Protection team’s data has shown that every country in the world has seen at least one COVID-19 themed attack, and the volume of successful attacks in outbreak-hit countries seems to be increasing, as fear and the desire for information grows. 

Of the millions of targeted phishing messages seen globally each day, roughly 60,000 include COVID-19 related malicious attachments or malicious URLs. Attackers are impersonating established entities like the World Health Organization (WHO), Centers for Disease Control and Prevention (CDC), and the Department of Health to get into inboxes. 

Dr. Dzahar further explained, “According to our data, we found that COVID-19 themed threats are mostly rethreads of existing attacks that have been slightly altered to tie to the pandemic. This means that attackers have been pivoting their existing infrastructure, like ransomware, phishing, and other malware delivery tools, to include COVID-19 keywords, to capitalize on people’s fear. Once users click on these malicious links, attackers can infiltrate networks, steal information and monetize their attacks.” 

Businesses and individuals have a crucial role to play in navigating cyberspace securely and are encouraged to take the following steps:

Guidance for businesses:

  • Have strong tools to safeguard employees and infrastructure. This means looking into multi-layered defense systems and turning on multi-factor authentication (MFA) as employees work from home. Additionally, enable endpoint protection and protect against shadow IT and unsanctioned app usage with solutions like Microsoft Cloud App Security
  • Ensure employee guidelines are communicated clearly to employees. This includes information on how to identify phishing attempts, distinguishing between official communications and suspicious messages that violate company policy, and where these can be reported internally
  • Choose a trusted application for audio/video calling and file sharing that ensures end-to-end encryption

Guidance for individuals:

  • Update all devices with the latest security updates and use an antivirus or anti-malware service. For Windows 10 devices, Microsoft Defender Antivirus is a free built-in service enabled through settings
  • Be alert to links and attachments, especially from unknown senders
  • Use multi-factor authentication (MFA) on all accounts. Now, most online services provide a way to use your mobile device or other methods to protect your accounts in this way
  • Get educated on how to recognize phishing attempts and report suspected encounters, including watching out for spelling and bad grammar, and suspicious links and attachments from people you do not know

For more information on the findings published on the Microsoft Security Intelligence website, please visit here.

Sign Up For Our Newsletter

Written By

At Microsoft, our mission is to empower every person and organization on the planet to achieve more. For more, visit our website.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

How Reverse Mentoring Can Eliminate Ageism In The Workplace

Perspectives

What’s Next For Influencer Marketing?

Perspectives

Gaming: Connected TV’s Hidden Champion

Perspectives

e-Signature: Is It Speeding Up Or Derailing Digitization?

Perspectives

Connect
Sign Up For Our Newsletter