The proliferation of cybercriminals

Talk here about Singapore forum
Post Reply
mithilassdd
Posts: 1
Joined: Tue Jan 10, 2023 8:56 am

The proliferation of cybercriminals

Post by mithilassdd »

During the pandemic significant zero-day vulnerabilities were discovered in services, platforms such as Zoom and other software-as-a-service applications that could have allowed attackers to remotely take control of users' devices. The need for remote access has driven the use of web apps, leading to an increase in attacks on these platforms, and according to a Verizon report, 20% of data breaches were attacks on web apps. Additionally, attacks on remote access protocols such as SMB and RDP have increased. In fact ESET reported a increase in attacks targeting regard to Latin.

America among the most detected exploits in the region include those that exploit vulnerabilities such as f exploit detections corresponding executive list to to the Double Pulsar exploit. In all three cases, these security flaws allow the attacker to take control of the affected system. However, what is more impressive is that these are known that had security patches released years ago. This indicates the lack of updates that occur in Latin America. In many cases, this is due to the use of outdated software, poor management or even worse the use of pirated software.

Image

Whatever the reason it is unfortunately a trend that we see as difficult to reverse in the short term On the other hand, ransomware remains a major concern for companies in Latin America. However, according to ESET telemetry data, 2021 was the year with the lowest number of ransomware detections compared to the previous six years. Is this good news? In fact, if we look at the number of hashes or unique ransomware samples detected year after year, we see that they have been increasing significantly. This shows how cybercriminals have shifted the focus of their attacks from mass campaigns to targeted operations. Considering that today ransomware no longer just encrypts the compromised computer's information, but also steals and exfiltrates data to extort and further pressure victims to pay the ransom.
Post Reply