16 Mar Asia Tops Ransomware Table in Microsoft Report
Hot off the presses, Microsoft released their bi-annual Security Intelligence Report yesterday with some interesting revelations. Most notably Asia is ranked as the highest geographical region for ransomware encounters; a prize usually reserved for Europe.
For any IT professional Microsoft Security Report is simply a must read, the analysis and depth of research is unparalleled evaluating cloud services, individual consumers, emails, and websites. In this edition, there were over 400 billion emails scanned and 18+ billion web pages scanned per month. If you haven’t had the chance to browse the report, you can grab it here.
The Big Scoop
Last year was a big deal for ransomware, WannaCry, Petya, and Bad Rabbit were some of the heavy hitters – and the ransomware theme features heavily in the report. Surprisingly, it was a relatively less well-known strain called LockScreen that actually was the most encountered ransomware. LockScreen was one of a rising trend of mobile-based ransomware viruses that have been infecting mobile and windows devices – it is expected this trend will continue.
It is not surprising that Asia witnessed high encounters of LockScreen as mobile proliferation is high throughout the continent, in particular, Thailand (around 110%) and as such the likelihood of encounters and infections is likely to be higher. Outside of ransomware activity, the report looks at the aftermath of Gamarue as well as up-and-coming trends in the digital world.
You can see Gamarue’s prevalence outlined below between December 2017 and January 2018 – Thailand is one of the high infection areas. Gamarue is mentioned in a previous Aware article, essentially it’s a botnet that can be purchased as a crime kit. The functionality of Gamarue is modular and can be extended by plug-ins which can cost extra depending on the facility, a Keylogger is $150, Teamviewer $250 but a Rootkit comes inbuilt.
There is a move from hackers to target low hanging fruit through poorly secured cloud apps and software. Phishing remains among the most common method of attack as well as the easiest to distribute: low barrier entry, for example, an email sent out to thousands of potential victims and only requires one person’s credentials to be effective. To find out how to help protect yourself you can find our previous article here.
- What is the Difference Between Business Continuity & Disaster Recovery? - April 2, 2020
- The Best WFH Business Software Solutions for Remote Employees - March 30, 2020
- Covid 19 Contact Form - March 23, 2020
- Power BI: Desktop vs Pro vs Premium - March 17, 2020
- 10 Benefits of Microsoft Power BI - March 16, 2020
- What is Power BI? - March 13, 2020
- Rethinking the Customer Journey: Micro Moments for digital marketing in 2020. - March 9, 2020
- Google Ads Audiences and Signals Explained - January 31, 2020
- How to Pick the Correct Ad Strategy - January 31, 2020
- How do I get my Advert to show? Ad Rank & Ad Auctions - January 30, 2020