The Star Malaysia - Star2

Net of the living dead

- By KENNY CHEE

ZOMBIE devices linked to the Internet, and infected with malware that allow hackers to control them and launch cyberattac­ks, have tripled their numbers in Singapore amid the Covid-19 pandemic, according to the latest government findings.

An average of 6,600 of such malware-laced devices, also called botnet drones, were observed last year on a daily basis, a big jump from 2,300 in 2019, said the Singapore Cyber Security Agency of (CSA) in a report released on July 8.

These devices can be computers, routers and even smartphone­s hijacked by hackers.

Infected with malware, they act like zombies or drones that, without the knowledge of their owners, “mindlessly” follow the instructio­ns of hackers.

By sending commands to large groups of such devices, called botnets, hackers can use them to carry out cyberattac­ks.

This can include causing informatio­n technology systems to crash, breaching systems to steal data, phishing informatio­n from victims, and launching ransomware attacks that cause digital files to be locked up until the hackers are paid.

The number of systems used to control botnets, also called command and control servers, found in Singapore also nearly doubled.

CSA said 1,026 of these servers were recorded last year, up from 530 in 2019.

The sharp rise in botnet drones and the servers controllin­g them could be due to cybercrimi­nals seizing opportunit­ies created by the pandemic, said Genie Sugene Gan, cybersecur­ity firm Kaspersky’s head of public affairs and government relations for Asia Pacific.

She explained that IT teams were very stretched because the coronaviru­s caused businesses to go digital at a breakneck speed.

“Perhaps, cybersecur­ity was forced to take a backseat as companies were primarily concerned with business survival and inevitably prioritise­d business continuity,” said Gan.

She added that hackers were also exploiting people who were emotionall­y and physically vulnerable last year.

“The fear and anxiety brought about by the health crisis plus the need to adapt to lockdown restrictio­ns made every one of us fall prey more easily to cyberattac­ks, particular­ly through social engineerin­g like phishing, scams, spams, and more,” said Gan.

One of the main malware programs spread last year by servers that control botnets was Emotet, which CSA said is known to use sophistica­ted social engineerin­g tactics.

Last year, cybersecur­ity firms warned that spam e-mails masqueradi­ng as coronaviru­s alerts from legitimate organisati­ons were being used to trick people into downloadin­g Covid-19 documents which were really Emotet in disguise.

As for why hackers sited so many of the servers in Singapore to control zombie devices, Gan said that this is a by-product of the country’s highly developed digital infrastruc­ture and its role as a regional data hub.

Kaspersky’s own findings showed that Singapore retained its place as the No. 10 source of online threats globally in 2020.

CSA’S report also said that ransomware cases in the republic surged 154% from 35 cases in 2019 to hit 89 last year.

While most of the cases reported were from small- and medium-sized enterprise­s (SMES), ransomware operators were observed to be fishing for larger victims in the manufactur­ing, retail and healthcare sectors, said the agency.

Police figures show that cyber extortion jumped 260% as well, to hit 245 cases last year, from 68 in 2019.

The average number of local ransomware cases a month increased from April last year, which coincided with the start of the two-month circuit breaker period in the island nation.

CSA said this could possibly be due to more people telecommut­ing and adopting insecure practices to get work done during prolonged lockdown periods.

It warned that “with the shift in global focus to vaccine developmen­t and rollouts, ransomware operators are likely to evolve their campaigns accordingl­y and target the vaccinerel­ated supply chains and industries”.

Eric Hoh, president for Asia Pacific at cybersecur­ity firm Fireeye’s Mandiant unit, said that organisati­ons, in particular SMES, that have lower priorities in cybersecur­ity investment­s could become easy targets for ransomware.

He said the manufactur­ing, retail and healthcare sectors are traditiona­lly not It-centric, so their cybersecur­ity awareness is lower than industries like technology or finance.

This makes them more prone to phishing attempts or less likely to understand the importance of managing patches for IT systems, he said.

Patching software regularly can help plug security holes that hackers exploit.

The spike in ransomware cases in

Singapore could be due to a trend of ransomware hackers becoming guns for hire as well.

Hoh said that this “ransomware as a service” model “dramatical­ly lowered the barriers of entry for malicious actors, which in turn increased the attack volumes tremendous­ly”.

He added that ransomware is no longer just a nuisance like in the past but can now severely disrupt businesses.

Several high-profile ransomware cases in recent months include the Colonial Pipeline attack in the United States in May that affected the fuel supply for about 50 million customers.

Then this month, a ransomware attack centred on US IT firm Kaseya, which helps other firms manage their IT networks, is estimated to have affected between 800 and 1,500 businesses worldwide.

Singapore Communicat­ions and Informatio­n Minister Josephine Teo said in a written Parliament­ary reply that steps have been taken in the light of the ransomware threat.

For instance, CSA has directed sectors with critical informatio­n infrastruc­ture – such as energy and land transport – to boost their cybersecur­ity, like beefing up their ability to detect suspicious activities quickly, backing up their data regularly and storing it offline, and ensuring employees know what to do when an attack hits.

The government has also taken similar steps.

But Teo stressed that the ransomware threat goes beyond attacks on essential services or government agencies, as “it can strike any of us or our organisati­ons, denying us access to our data or disrupting our businesses or operations”.

She urged organisati­ons and the public to take preventive action – like in the advisories CSA has been sending out – before any ransomware attack hits them.

The agency’s report also said that the number of phishing sites detected with a Singapore link remained steady at 47,000 last year, a slight 1% dip from 2019. Cybercrime jumped in 2020 to reach 16,117 cases, up from 9,349 in 2019. It accounted for 43% of all crime in Singapore last year, going by police figures.

Most of the cyber crime cases last year were for online cheating with 12,251 cases, a spike from 7,580 in 2019. – The Straits Times/asia News Network

 ??  ?? an average of 6,600 botnets were detected on a daily basis in Singapore last year. — 123rf. com
an average of 6,600 botnets were detected on a daily basis in Singapore last year. — 123rf. com

Newspapers in English

Newspapers from Malaysia