Gulf News

EMEAfirms takemonths to detect cyber attacks

Iran- sponsored attackers engage in multiple operations against range of victims

- BYNAUSHAD K. CHERRAYIL Staff Reporter

Organisati­ons in Europe, Middle East and Africa are 2.5 months slower to respond to a cyber attack than the global average, according to M- Trends 2018 report released on Monday.

Investigat­ions conducted by Mandiant security analysts, a FireEye company, showed that the average time for a Menabased company to detect an incident stands at 175 days for EMEA compared to a global average of 101 days.

Speaking to GulfNews, Yazan A. Hammoudah, Manager for Systems Engineerin­g at FireEye Middle East and Africa, said that the rise is due to the amount and variety of attacks from both advanced persistent threat ( APT) or state- sponsored attackers and cybercrime groups. In 2016, it was 106 days for EMEA and 99 days globally. So, he said that it shows how advanced the threat actors have evolved over the years.

In 2017, Hammoudah said that Iran has increased its cyber espionage capabiliti­es and is now operating at a pace and scale consistent with other state- sponsored APT groups.

“We found four groups such as APT32, APT33, APT34 and APT35 from Iran and their victims spans every sector and extends well beyond regional conflicts in the Middle East,” he said.

The report said that APT32 targeted Vietnam while APT33 targeted Saudi Arabian and Western organisati­ons that provide training, maintenanc­e and support for Saudi Arabia’s military and commercial fleets; APT34 targeted Middle Eastern financial, energy and government organisati­ons, and APT35, since 2014, targeted the US and the Middle Eastern military, diplomatic and government personnel, media, energy and defence industrial base.

Multiple operations

From August 2016 to August 2017, he said that APT35 engaged in multiple operations against a broad range of victims. “Rather than relying on publicly available malware and utilities, Iranian hackers developed and deployed their own malware. When they are not carrying out attacks against their targets, they are conducting espionage and stealing data,” Hammoudah said.

“Some of the industrial control systems ( ICS) in the region are using very old machines and now we are discoverin­g a number of compromise­s. Once we went into the ICS, the malware has been in the system for many years with the hackers thinking like a foothold for future positionin­g rather than active attacks in 2017,” he said.

He, however, said that this is due to the shortage of cybersecur­ity skills gap and the average dwell time will increase further in the coming years. “We are starting to see increased investment in developing the cyber defence skills among universiti­es. As the demand for skilled personnel capable of meeting the challenges posed by these threat actors continues to rise, the supply simply cannot keep pace,” he said.

FireEye’s research indicates that Chinese cyber operations targeting the intellectu­al property of US companies declined significan­tly after the signing of an agreement by former President Barack Obama and China’s President Xi Jinping in September 2015.

devices Sony sold globally in 2017, accounting for a market share of 1%

Newspapers in English

Newspapers from United Arab Emirates