Breaking News

Firewalla AP7 Brings Zero Trust and Wi-Fi 7 to Homes and Small Businesses ASUS Announces October Availability of ProArt Display 8K PA32KCX MSI Clarifies GeForce RTX 5090 Is Not Officially Sold in China CORSAIR Unveils Platinum-rated HXi SHIFT PSUs with iCUE LINK System Hub and PCIe 5.1 support Panasonic Announces Limited Drop of LUMIX S9 Titanium Gold Edition Models in Europe

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Cybersecurity Report Reveals Big Game Hunting, Telecommunication Targeting Take Center Stage for Cyber Adversaries

Cybersecurity Report Reveals Big Game Hunting, Telecommunication Targeting Take Center Stage for Cyber Adversaries

Enterprise & IT Mar 3,2020 0

During 2019, financially motivated cybercrime activity occurred on a nearly continuous basis. An increase in incidents of ransomware, the maturation of the tactics used, and increased ransom demands from eCrime actors have been observed.

According to cloud-delivered endpoint protection provider CrowdStrike, the bad actors have begun conducting data exfiltration, enabling the weaponization of sensitive data through threats of leaking embarrassing or proprietary information.

In their latest CrowdStrike 2020 Global Threat Report, the secutity firm found that nation-state adversaries continued unabated throughout 2019, targeting a wide range of industries. Another key trend in the report is the telecommunications industry being targeted with increased frequency by threat actors, such as China and DPRK. CrowdStrike Intelligence assesses that various nations, particularly China, have interest in targeting this sector to steal intellectual property and competitive intelligence.

CrowdStrike recommends organizations to pursue the “1-10-60 rule” in order to effectively thwart cyberthreats. 1-10-60 guidelines are the following: detect intrusions in under one minute; investigate in 10 minutes; contain and eliminate the adversary in 60 minutes. CrowdStrike believes that organizations that meet this benchmark are much more likely to eradicate the adversary before an attack spreads from its initial entry point, ultimately minimizing organizational impact.

“2019 brought an onslaught of new techniques from nation-state actors and an increasingly complex eCrime underground filled with brazen tactics and massive increases in targeted ransomware demands. As such, modern security teams must employ technologies to detect, investigate and remediate incidents faster with swift preemptive countermeasures, such as threat intelligence, and follow the 1-10-60 rule,” said Adam Meyers, vice president of Intelligence at CrowdStrike.

Other notable highlights from the 2020 Global Threat Report include:

  • The trend toward malware-free tactics accelerated, with malware-free attacks surpassing the volume of malware attacks. In 2019, 51% of attacks used malware-free techniques compared to 40% using malware-free techniques in 2018, underscoring the need to advance beyond traditional antivirus (AV) solutions.
  • China continues to focus many operations on supply chain compromises, demonstrating the nation-state’s continued use of this tactic to identify and infect multiple victims.
  • Other targeting of key U.S. industries deemed vital to China’s strategic interests — including clean energy, healthcare, biotechnology, and pharmaceuticals — is also likely to continue.
  • The industries at the top of the target list for enterprise ransomware (Big Game Hunting) observed were local governments and municipalities, academic institutions, the technology sector, healthcare, manufacturing, financial services and media companies.
  • In addition to supporting currency generation, DPRK’s targeting of cryptocurrency exchanges could support espionage-oriented efforts designed to collect information on users or cryptocurrency operations and systems. In addition, CrowdStrike Intelligence suspects that DPRK has also been developing its own cryptocurrency to further circumvent sanctions.

Tags: Cyber AttackCybersecurityRansomware
Previous Post
Chinese Geely Builds Presence in Satellite Industry with New Plant and Testing Centre
Next Post
Porsche Announces The New 911 Turbo S

Related Posts

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Texas Courts Faced a Ransomware Attack

  • Intel Confirms "Thunderspy" Risk in Thuerbolt Devices

  • GoDaddy Discloses Data Breach

  • Indonesia's Tokopedia Inverstigates Alleged Data Leak of 91 Million Users

  • Apple Says 'No Evidence' iPhone Mail Bug Used Against Consumers

  • Malwarebytes Introduces VPN Service

  • Google Says State-backed Hackers Use Coronavirus For Phishing Attacks

Latest News

Firewalla AP7 Brings Zero Trust and Wi-Fi 7 to Homes and Small Businesses
Enterprise & IT

Firewalla AP7 Brings Zero Trust and Wi-Fi 7 to Homes and Small Businesses

ASUS Announces October Availability of ProArt Display 8K PA32KCX
Consumer Electronics

ASUS Announces October Availability of ProArt Display 8K PA32KCX

MSI Clarifies GeForce RTX 5090 Is Not Officially Sold in China
GPUs

MSI Clarifies GeForce RTX 5090 Is Not Officially Sold in China

CORSAIR Unveils Platinum-rated HXi SHIFT PSUs with iCUE LINK System Hub and PCIe 5.1 support
PC components

CORSAIR Unveils Platinum-rated HXi SHIFT PSUs with iCUE LINK System Hub and PCIe 5.1 support

Panasonic Announces Limited Drop of LUMIX S9 Titanium Gold Edition Models in Europe
Cameras

Panasonic Announces Limited Drop of LUMIX S9 Titanium Gold Edition Models in Europe

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed