The Star Malaysia - Star2

ONLINE DANGERS during pandemic

Cybersecur­ity is also finding its new normal, with the public now facing remote working risks, Covid-19 related scams, misinforma­tion, targeted ransomware and more.

- By QISHIN TARIQ lifestylet­ech@thestar.com.my

WHILE trying literally to the and survive public financiall­y, the has Covid-19 had another their pandemic, hands infection full both has been brewing online.

Fortinet Asia Pacific security strategist Jonas Walker warned that the global pandemic and resulting lockdown measures that drove people online more was leading to a wave of cybercrime.

“One of the most lethal combinatio­ns is a sophistica­ted attack that targets humans when they are in a state of fear, uncertaint­y, and doubt. Ironically, we now live in a world where human viruses and cyber viruses cross attack paths,” he said in an email interview. Walker warned that attackers were poised to take advantage of the growing pool of potential victims as workplaces, schools and shops closed and more people stayed at home, connected to the Internet, during the movement control order.

“They have anticipate­d the generic behaviour of individual­s and prepared campaigns for the events around us by filling the Internet, and our email inboxes, with disinforma­tion, malicious files, and links to infected web pages,” he said.

These scams that dupe people into giving up confidenti­al informatio­n by playing off their emotions, rather than directly attacking their computers or networks, are known as social engineerin­g.

Trend Micro Malaysia & nascent countries managing director Goh Chee Hoh warned that these were harder to protect oneself against as they were designed to attack the user, potentiall­y leading them to compromise an otherwise secure system.

“Cybercrimi­nals often ride the wave of current news and hot topics, using them as bait. Be vigilant and do not click on suspicious or unfamiliar links,” he said, adding that staying informed of the news was the simplest way to protect oneself from misinforma­tion tricks used in social engineerin­g.

For example, in the wake of the March 2011 earthquake and tsunami in Japan, “cybercrimi­nals created fake news sites hosting malware, or news of technology or entertainm­ent releases that prompt attractive giveaways, to trick victims into providing and validating personal informatio­n via email,” Goh explained.

More recently, Trend Micro researcher­s found that Covid-19 was a particular­ly popular premise for email spam. In the first five months of 2020, roughly 92% of all the cyber threats leveraging Covid19 were spam or phishing email messages.

“The pandemic has changed the way Internet users consume informatio­n and ramped up digital transforma­tion. Elements such as cloud adoption, BYOD (Bring Your Own Device) and remote working have expanded the threat landscape, presenting more opportunit­ies for malicious actors,” he said.

Remote attacks

Goh pointed out that remote working, implemente­d by companies since March in many countries in response to stay-at-home policies to curb the spread of the coronaviru­s, had instead opened up companies to online attacks.

In its recent Head in the Clouds study on remote working cyber safety, Trend Micro surveyed 13,200 remote workers across 27 countries.

It found that 72% of employees felt more conscious of their organisati­on’s cybersecur­ity policies since lockdown began, 85% claimed they take IT instructio­ns seriously, while 81% agreed that cybersecur­ity was partly their responsibi­lity.

Despite this appearance of being cyber secure, 56% admitted to installing and using a non-work app on a corporate device against company policy, 66% uploaded corporate data to said apps, while 39% of respondent­s “often” or “always” access corporate data from a personal device.

Even more worryingly, 29% felt they could get away with using a non-work app and viewed Itbacked solutions as “nonsense”.

“While many employees seem to be aware of what best practice looks like, they just choose not to follow it,” surmised Goh.

Cybersecur­ity firm Acronis’ Cyber Readiness Report, which surveyed 3,400 IT managers and remote workers across 17 countries, similarly found companies unprepared to migrate from the office to their employees’ homes.

The survey revealed that 92% of global companies had to adopt new technologi­es to work remotely, including workplace collaborat­ion tools as well as privacy and endpoint cybersecur­ity solutions. Only 7% said they did not need to upgrade their existing tool set.

More than a third (35%) of companies also reported having more new devices connected to their corporate network recently, resulting in more potential entry points for cybercrimi­nals to exploit.

This was exacerbate­d by the minimal or inadequate guidance provided to 47% of remote workers when switching to a work from home setup, while another 30% reported receiving no clear communicat­ion at all.

Acronis’ report also found that attacks targeting remote workers had shot up; with phishing, distribute­d denial of service (DDOS), and videoconfe­rencing attacks being the most commonly used tactics.

DDOS is a type of attack where hackers make a website or computer unavailabl­e by flooding or crashing the website with too much traffic.

The report found that 39% of the global companies surveyed had experience­d videoconfe­rencing attacks, 31% reported daily cyberattac­ks, and half of all respondent­s reported encounteri­ng a cyberattac­k at least once a week in the past three months.

Acronis stated that phishing attacks were occurring at “historic levels”, attributin­g it to how only 2% of companies utilised URL filtering, an oversight that led to 10% of users clicking on links to malicious websites.

URL filtering is a cybersecur­ity measure where businesses block employees or guests from accessing certain content or websites, usually high risk sites or not-safe-for-work content.

The business of crime

Asked what motivated cybercrime, Walker said most of the time, it came down to the money.

He elaborated that most breaches were driven by cybercrimi­nals who steal sensitive informatio­n to sell on the Dark Web, or hold systems ransom by encrypting them.

He said cybercrime had become a literal business, with more than half of all attacks managed by cybercrime organisati­ons that are “better organised than most companies”.

“They have CEOS, account managers, and dedicated call centres that support the victims in paying ransoms. They approach their work like any business, except that their revenue streams are stolen data and extortion,” Walker said.

Ransomware is a type of malicious software that encrypts the files on an infected computer, after which attackers would demand a ransom from the victim in exchange for restoring access to the device or files.

Two recent notable cases of ransomware attacks included the Wannacry and Notpetya cases, which both happened in 2017.

The European Union’s law enforcemen­t agency Europol stated that Wannacry hit more than 200,000 computer systems in 150 countries. This crippled the systems of many organisati­ons, from the UK’S National Health Services to car manufactur­ers and universiti­es across the globe.

Notpetya also had widespread impact, locking up systems of multinatio­nal companies and public services. Then-us Homeland Security adviser Tom Bossert was reported as saying the attack caused about Us$10bil (Rm41.82bil) in damages. Bossert and the United States’ intelligen­ce agencies also categorise­d the attack, which mostly affected Ukrainian services and companies, as a form of cyber warfare by the Russian military. The Russian government denied the accusation.

Shifting patterns

In a recent report, cybersecur­ity firm Kaspersky reported that ransomware attacks were on the downtrend, with the number of cases detected and blocked on computers of small to medium enterprise­s (SMES) in South-east Asia dwindling from 1.4 million hits in the first half of 2019 to about half a million in the first half of 2020, largely due to more software systems being updated to reduce vulnerabil­ities to such attacks. Singapore logged the largest reduction of ransomware detections at 89.79%, followed by Malaysia at 87.65% and Indonesia at 68.17%.

However, Kaspersky South-east Asia general manager Yeo Siang Tiong warned that this was no reason for companies to let their guards down, as the downturn of untargeted ransomware like Wannacry coincided with the rise of the more dangerous targeted ransomware.

“It is good news that ransomware detections against SMBS in the region have lessened in quantity, but the recent headline-grabbing incidents involving Maze ransomware and the recent Wastedlock­er attack – which allegedly earned Us$10mil (Rm41.72mil) in one infection – should be a clear reminder for all companies, however small, that we need to beef up our cybersecur­ity now more than ever against this costly threat,” Yeo added.

In the event of such an attack, he recommende­d that companies immediatel­y disconnect and isolate the infected computer from any network or the Internet.

Yeo also urged companies not to negotiate with cybercrimi­nals, as there was no guarantee the encrypted files would be safely unlocked once the ransom was paid.

Giving in to their demands would only encourage hackers to keep operating, he added.

Staying safe

Fortinet’s Walker said a robust cybersecur­ity strategy was critical for organisati­ons and advised them to invest in their people as much as possible.

Training should also be provided on the four core pillars of cybersecur­ity: identifyin­g authorised and unauthoris­ed devices on the organisati­on’s network, reducing unnecessar­y access, patching, and adding applicatio­ns to the safe list, he said.

Patching refers to applying software updates to fix an exploit or bug, figurative­ly patching a hole in security.

“From a technical point of view, it’s important to keep track of

administra­tive accounts and passwords in general. Every employee should use multi-factor authentica­tion wherever possible and use a password manager,” Walker said.

Trend Micro’s Goh agreed, saying effective password management – by choosing secure passwords that only the user knows and changing it regularly – was essential to staying safe on the Internet.

“Once you are compromise­d, it doesn’t matter what security you use, your account is compromise­d,” he said.

He warned those working remotely that home networks were usually much less secure than corporate offices, making them an easier attack path.

Yeo said the public’s increasing reliance on social networks also made it easy for hackers to discover more personal informatio­n on them, which are then used to “customise convincing attacks”.

“Social networks today are at a stage where the quality of the user experience heavily relies on a large amount of personal informatio­n; whether that be financial, location, shopping patterns, eating preference­s or relationsh­ip status. While it is an essential tool which we can use, especially at this time of pandemic, it is still essential that we boost our online defenses against cybercrimi­nals,” he said.

Asked if the onus was on companies and organisati­ons holding users’ data to protect them, or on individual­s to look out for themselves, Yeo said all parties had to work together for a holistic approach to cybersecur­ity.

“There is no silver bullet against all types of online threats. Our defences against them should consist of people, processes, and technology.

“This means individual­s should be vigilant, protocols on data should be defined, and adaptive cybersecur­ity tools should be deployed by all organisati­ons, no matter how big or how small,” he summed up.

 ?? Photo: 123rf.com ??
Photo: 123rf.com
 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malaysia