Skip to main content

COVID-19 fuels cyber attacks, exposes gaps in business recovery


Some 91% of businesses reported an increase in cyber attacks with employees working from home, including 93% in Singapore, where 89% and 86% also noted gaps in their business recovery planning and IT operations, respectively, as a result of the global pandemic.
The majority of businesses worldwide have seen a jump in cyber attacks as a result of employees working from home, with most reporting an increase in COVID-19 related malware. In Singapore, the global pandemic also revealed gaps in organisations’ disaster recovery plans and IT operations.
Some 91% of enterprises reported an increase in cyber attacks with more employees working from home amidst the coronavirus outbreak, according to a global survey released Tuesday by VMware Carbon Black. Conducted in March by research firm Opinion Matters, the study polled 3,012 IT and cybersecurity leaders across several markets including Japan, Australia, Germany, the UK, and Singapore, where there were 251 respondents.
COVID-19 inspired malware saw the highest jump across the globe, with 92% noting an increase in such threats compared to typical volumes before the outbreak. Pandemic aside, 90% reported a climb in cyber attacks over the past year, with 80% noting an increase in the level of sophistication in such threats.
Some 94% said they suffered breaches in the past 12 months, including 100% in Canada and the Netherlands, and 99.6% in the Nordics. In Asia-Pacific, 96% in Australia, 92% in Japan, and 80% in Singapore reported likewise.
Vulnerabilities in OSes were the most common cause of breaches, as cited by 18% worldwide, while island-hopping was the main cause of breaches in markets such as Italy and the Nordics and web application attacks were most common in Canada.
In Singapore, 43% saw increased attack volumes over the past year, reporting an average 1.67 breaches, and 67% said such threats now were more sophisticated. OS vulnerabilities were the most common cause of breaches, as cited by 20% in the city-state, while 15% pointed to holes in third-party application that led to security breaches.
Island-hopping attacks also climbed more than three-fold in frequency, with 10% of Singapore companies encountering such attacks and 12% cited these as the cause of breaches. In such tactics, attackers target a larger group to indirectly breach a network, such as an organisation’s weaker and less secured community of business partners.
With added risks from third-party applications and the supply chain, these findings revealed that the extended enterprise was under pressure, according to Rick McElroy, VMware Carbon Black’s cyber security strategist.
The COVID-19 outbreak also unveiled gaps in business recovery planning of 89% in the country, who described such holes as slight to severe. Another 86% uncovered gaps in their IT operations as a result of the pandemic, while 85% identified problems due to a remote workforce and 73.5% had issues related to visibility of cybersecurity threats.
McElroy said: “The global situation with COVID-19 has put the spotlight on business resilience and disaster recovery planning. Those organisations that have delayed implementing multi-factor authentication (MFA) appear to be facing challenges, as 32% of Singaporean respondents say the inability to implement MFA is the biggest threat to business resilience they are facing right now.
“These figures indicate that the surveyed CISOs (chief information security officers) may be facing difficulty in a number of areas when answering the demands placed on them by the COVID-19 situation,” he said.
In addition, respondents in Singapore on average used more than 11 different tools or consoles to manage their cybersecurity strategy, indicating a complex and multi-technology environment that grew reactively with security tools bolted on to address evolving threats.
McElroy noted: “Siloed, hard-to-manage environments hand the advantage to attackers from the start. Evidence shows that attackers have the upper hand when security is not an intrinsic feature of the environment. As the cyber threat landscape reaches saturation, it is time for rationalisation, strategic thinking and clarity over security deployment.”
According to the survey, 90% of Singapore respondents planned to up their spending in cyberdefence in the coming year. This, however, was a drop from 99% in the previous October 2019 study who indicated likewise.

Originally published at https://www.zdnet.com on July 21, 2020.

Comments

Popular posts from this blog

Google can now help you figure out that song stuck in your head - all you have to do is hum (or whistle) into your phone

  Google just launched its “hum to search” feature, which allows users to hum, whistle, or sing for 10–15 seconds in order to identify a song. The feature currently works in 20 languages, and Google hopes to add more. Google has finally launched the perfect feature for when a song is stuck in your head but you don’t know any of the words. “Hum to search” launched today on both the Google app for iOS and Android, according to Google’s blog, The Keyword. Users can also whistle or sing directly into the mic to identify a song. The technology works like this: the user can hum (whistle, or sing) for 10–15 seconds, and then Google’s technology takes the song’s melody and turns it into a numbers-based sequence. From there, the sequence can be used to “identify songs based on a variety of sources, including humans singing, whistling or humming, as well as studio recordings,” according to Google’s announcement. The sequence also strips away any other outside noise, like accompanying instru...

Ransomware's Dangerous New Trick Is Double-Encrypting Your Data

  Ransomware groups have always taken a more-is-more approach . If a victim pays a ransom and then goes back to business as usual-hit them again. Or don’t just encrypt a target’s systems; steal their data first, so you can threaten to leak it if they don’t pay up. The latest escalation? Ransomware hackers who encrypt a victim’s data twice at the same time. Double-encryption attacks have happened before, usually stemming from two separate ransomware gangs compromising the same victim at the same time. But antivirus company Emsisoft says it is aware of dozens of incidents in which the same actor or group intentionally layers two types of ransomware on top of each other. “The groups are constantly trying to work out which strategies are best , which net them the most money for the least amount of effort,” says Emsisoft threat analyst Brett Callow. “So in this approach you have a single actor deploying two types of ransomware. The victim decrypts their data and discovers it’s not act...

WhatsApp Users Exchanged Over 100 Billion Messages on New Year’s Eve, A New Record

WhatsApp is one of the most widely used communication apps on the planet and as such, clocks an insane number of messages and media exchanges on a daily basis. But the New Year's Eve broke a record that has been standing since WhatsApp's debut a decade ago. WhatsApp has revealed that users exchanged over 100 billion messages on New Year's eve. And out of that number, more than 20 billion messages were shared by Indian users alone. Moreover, around 12 billion out of the 100 billion+ messages shared on the platform were images. WhatsApp wrote in a press release that over 100 billion messages were shared globally on December 31 in the 24-hour duration leading up to the midnight of New Year's Eve. This is a record-breaking volume and is the highest number of messages exchanged in a single day ever since WhatsApp kicked off its services ten years ago. Out of those 100 billion+ messages shared on New Year's eve, WhatsApp says over 12 billion were images. Meanwhile...