security endpoint threat report 2019€¦ · evolving landscape. security endpoint threat report...

1
Navigating Asia Pacific’s cyberthreat landscape Cybersecurity remains a top priority in today’s interconnected world. Microsoft shares trends in endpoint threats across developing and developed markets in Asia, based on analysis of over 8 trillion threat signals daily from January to December 2019, and guidance for staying cybersafe in today’s evolving landscape. SECURITY ENDPOINT THREAT REPORT 2019 SECURITY ENDPOINT THREAT REPORT 2019 The research covered a total of 15 markets, including developing markets China, India, Indonesia, Malaysia, Philippines, Sri Lanka, Thailand, Vietnam; and developed markets Taiwan, Singapore, New Zealand, Korea, Japan, Hong Kong, Australia. Markets were categorized with reference to International Monetary Fund’s World Economic Database, October 2018. EVOLVING CYBERTHREATS IN ASIA PACIFIC GUIDANCE FROM MICROSOFT MALWARE Code developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network Cybercriminals remain focused on attacking countries with lower levels of cyber awareness and high usage of unlicensed and/or pirated software, and sites that illegitimately offer free software or content. Malware encounter rate across Asia Pacific 5.34% 23% from 2018 1 2 3 Japan New Zealand Australia Highest encounter rate 1 2 3 Indonesia Sri Lanka Vietnam Lowest encounter rate RANSOMWARE Malicious software that disables a device or its files until the attacker is paid a ransom Ransomware encounter rate across Asia Pacific 0.05% 29% from 2018 Even with a slowdown in ransomware encounters, cyber attackers are shifting their efforts to customized campaigns targeting specific geographical areas, industries and businesses. 1 2 3 Vietnam Indonesia India 1 2 3 Japan New Zealand Australia Highest encounter rate Lowest encounter rate Malware introduced into an unsuspecting user or organization’s machine(s), which then uses the machine’s computing power to mine cryptocurrency Cryptocurrency mining encounter rate across Asia Pacific 0.05% 64% from 2018 Cryptocurrency mining trends across developed vs developing countries 1 2 3 Japan Australia China CRYPTOCURRENCY MINING While recent fluctuations in cryptocurrency value and the increased time required to generate cryptocurrency have resulted in attackers refocusing their efforts, cyber attackers are continuing to target countries with low user awareness and low adoption of cyber hygiene practices. 1 2 3 Sri Lanka India Vietnam Highest encounter rate Lowest encounter rate Unintentional download of malicious code to a device when the user visits a website, aimed at exploiting vulnerabilities in web browsers, applications, or even the operating system Drive-by download attack volume across Asia Pacific 0.08* 27% from 2018 Drive-by download trends across developed vs developing countries 1 2 3 New Zealand Korea Philippines DRIVE-BY DOWNLOAD Cybercriminals remain focused on stealing financial information or intellectual property. This has resulted in the highest attack volume occurring in key financial hubs. 1 2 3 Singapore Hong Kong India Highest attack volume Lowest attack volume *Average volume of drive-by-download pages detected for every 1,000 pages indexed by Bing THREATS MICROSOFT IS SEEING SINCE COVID-19 Many of the compromises that enabled these attacks existed earlier – multiple ransomware groups have been accumulating access and maintaining persistence on target networks for several months Attackers had been silently waiting to monetize their ransomware attacks to maximize financial gains Attacks have affected aid organizations, medical billing companies, manufacturing, transport, government institutions, and educational software providers The attacks all used the same techniques – credential theft and lateral movement – culminating in the deployment of a ransomware payload of the attackers’ choice DO DO DO DO SAFEGUARD employees with strong tools and infrastructure SET UP multi-factor authentication (MFA) as employees work from home INCLUDE end-to-end encryption on trusted applications for audio/video calling and file sharing INDIVIDUALS GUIDE employees on how to identify phishing attempts and suspicious messages INSTALL an antivirus service on computing devices UPDATE all devices with the latest security updates WATCH OUT for malicious or compromised websites AVOID pirated software RECOGNIZE and report suspected attack attempts DO DO DO DO DO VERIFY all links and attachments before opening them DO ORGANIZATIONS

Upload: others

Post on 04-Oct-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURITY ENDPOINT THREAT REPORT 2019€¦ · evolving landscape. SECURITY ENDPOINT THREAT REPORT 2019 SECURITY ENDPOINT THREAT REPORT 2019 The research covered a total of 15 markets,

Navigating Asia Pacific’s cyberthreat landscapeCybersecurity remains a top priority in today’s interconnected world. Microsoft shares trends in endpoint threats across developing and developed markets in Asia, based on analysis of over 8 trillion threat signals daily from January to December 2019, and guidance for staying cybersafe in today’s evolving landscape.

SECURITY ENDPOINT THREAT REPORT 2019SECURITY ENDPOINT THREAT REPORT 2019

The research covered a total of 15 markets, including developing markets China, India, Indonesia, Malaysia, Philippines, Sri Lanka, Thailand, Vietnam; and developed markets Taiwan, Singapore, New Zealand, Korea, Japan, Hong Kong, Australia.Markets were categorized with reference to International Monetary Fund’s World Economic Database, October 2018.

Lorem ipsum

EVOLVING CYBERTHREATS IN ASIA PACIFIC

GUIDANCE FROM MICROSOFT

MALWARECode developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network

Cybercriminals remain focused on attacking countries with lower levels of cyber awareness and high usage of

unlicensed and/or pirated software, and sites that illegitimately offer free software or content .

Malware encounter rate across Asia Pacific

5.34%23% from 2018

123

Japan

New Zealand

Australia

Highest encounter rate

123

Indonesia

Sri Lanka

Vietnam

Lowest encounter rate

RANSOMWAREMalicious software that disables a device or its files until the attacker is paid a ransom

Ransomware encounter rate across Asia Pacific

0.05%29% from 2018

Even with a slowdown in ransomware encounters, cyber attackers are shifting their efforts to customized

campaigns targeting specific geographical areas, industries and businesses.

123

Vietnam

Indonesia

India

123

Japan

New Zealand

Australia

Highest encounter rate Lowest encounter rate

Malware introduced into an unsuspecting user or organization’s machine(s), which then uses the machine’s computing power to mine cryptocurrency

Cryptocurrency mining encounter rate across Asia Pacific

0.05%64% from 2018

Cryptocurrency mining trends acrossdeveloped vs developing countries

123

Japan

Australia

China

CRYPTOCURRENCYMINING

While recent fluctuations in cryptocurrency value and the increased time required to generate cryptocurrency have

resulted in attackers refocusing their efforts, cyber attackers are continuing to target countries with low user awareness and low adoption of cyber hygiene practices .

123

Sri Lanka

India

Vietnam

Highest encounter rate Lowest encounter rate

Unintentional download of malicious code to a device when the user visits a website, aimed at exploiting vulnerabilities in web browsers, applications, or even the operating system

Drive-by download attack volume across Asia Pacific

0.08*27% from 2018

Drive-by download trends acrossdeveloped vs developing countries

123

New Zealand

Korea

Philippines

DRIVE-BYDOWNLOAD

Cybercriminals remain focused on stealing financial information or intellectual property. This has resulted in

the highest attack volume occurring in key financial hubs.

123

Singapore

Hong Kong

India

Highest attack volume Lowest attack volume

*Average volume of drive-by-download pages detected for every 1,000 pages indexed by Bing

THREATS MICROSOFT IS SEEING SINCE COVID-19

Many of the compromises that enabled these attacks existed earlier – multipleransomware groups have

been accumulating access and maintaining persistence

on target networks for several months

Attackers had been silently waiting to monetize their

ransomware attacks tomaximize financial gains

Attacks have affected aid organizations, medical billing

companies, manufacturing, transport, government

institutions, and educational software providers

The attacks all used the same techniques – credential theft

and lateral movement – culminating in the

deployment of a ransomware payload of the attackers’

choice

DO

DO

DO

DO

SAFEGUARD employees with strong tools and infrastructure

SET UP multi-factor authentication (MFA)as employees work from home

INCLUDE end-to-end encryption on trusted applications for audio/video calling and file sharing

INDIVIDUALS

GUIDE employees on how to identify phishing attempts and suspicious messages

INSTALL an antivirus service on computing devices

UPDATE all devices with the latest security updates

WATCH OUT for malicious or compromised websites

AVOID pirated software

RECOGNIZE and report suspected attack attempts

DO

DO

DO

DO

DO

VERIFY all links and attachments before opening themDO

ORGANIZATIONS