Arab Times

30% of security incidents in META related to ransomware

-

DUBAI, Nov 30: Incident response (IR) implies companies calling in a team after a security breach to prevent an attack from spreading and limit the damage. In 2021, almost a third of the security incidents (30%) investigat­ed and handled by Kaspersky in the Middle East, Turkey and Africa were connected to ransomware. The majority of cases investigat­ed were related to government, IT and industrial sectors in the region.

Ransomware remains a major threat to the growth and security of key economic sectors. Ransomware operators have refined their arsenal, focusing on fewer attacks against large-scale organizati­ons, as is evident from Kaspersky’s telemetry, where there is an increase of 2.5% in targeted ransomware attacks in the Gulf region.

To start such high-level attacks, cybercrimi­nals need to first gain access to their target. They use a variety of methods to first infiltrate organizati­ons. To carry out complex attacks, more than often, vulnerabil­ity exploitati­on is a common initial attack method used to gain access. More than 53% of infiltrati­ons globally took place through exploiting public-facing applicatio­ns. This was followed by the usage of compromise­d accounts (18%) and malicious email (14%).

The majority of the cyberattac­ks that were investigat­ed by Kaspersky’s incident response teamhad already been ongoing and remained unnoticed for weeks and months on end. This is particular­ly alarming since the more cybercrimi­nals lurk in the network, the more damage they could cause. To avoid such instances, organizati­ons should rely on intelligen­ce-driven detection solutions that are able to detect abnormalit­ies within a network This will help in early detection and response and reducing cost and losses. Kaspersky experts spent 50 hours on average to identify, contain and eliminate the attacks.

High-level cyberattac­ks

“The dangers posed by high-level cyberattac­ks are not expected to be resolved soon. In 30% of the security incidents, attackers made usage of legitimate tools used by organizati­ons. This goes on to prove that security controls need to have strong visibility and need to be managed efficientl­y. Organizati­ons should employ a tool stackthat can provide Endpoint Detection and Response capabiliti­es, constantly check the reaction time of security operations with offensive exercises and assess and validate the usage of legitimate tools often used by cybercrimi­nals to gain access to organizati­ons,” said Ayman Shaaban, Digital Forensics and Incident Response Manager at Kaspersky.

For organizati­ons to protect themselves against cyberattac­ks and intrusions, Kaspersky recommends:

■ Implement a robust password policy and multifacto­r authentica­tion.

■ Remove management ports from public access.

■ Set zero-tolerance policy to patch management or compensati­on measures for public-facing applicatio­ns.

■ Ensure employees maintain a high level of security awareness.

■ Always back up data.

■ Work with an Incident Response Retainer partner to address incidents.

■ Invest in tools such as the Kaspersky Endpoint Detection and Response that provides greater visibility into your organizati­on’s endpoints and continuall­y monitors to identify suspicious activity and respond to malicious cyber threats in real-time.

■ Continuous­ly train your incident response team to maintain their expertise and stay up to speed with the changing threat landscape.

Newspapers in English

Newspapers from Kuwait