The 5 most widely used types of cyber attacks in Latin America 2018 | this is | AETecno


ESET research companies analyze the main characteristics, and the reasons why this method is increasingly being used by attackers who benefit from the resources and information from users.

From the ESET Research Laboratory, a specialist in threat detection, they analyzed the attacks most often used in 2018 in Latin America. Companies share the main characteristics, and the reasons why this method is increasingly used by attackers who benefit from the resources and information from users.

5 of the most used cyber attacks in 2018:

1. Phishing attacks, with campaigns to spread new features.

Many phishing websites now use security certificates. According to the Antiphishing Working Group, during the second quarter of 2018, around 35% of registered phishing attacks are hosted on websites with the HTTPS protocol, a significant increase compared to almost 5% of cases of fake sites with SSL certificates, reported at the end of 2016.

In addition, alternative ways of propagating to "traditional" e-mail are used, such as messaging applications; to reach more potential victims. At the same time, this malicious campaign also includes the characteristics of homographical attacks, which add more difficulties for users to identify apocryphal websites.

"Security practices that were previously recommended in connection with phishing remain valid, though not enough, because of the new characteristics of this type of attack. Now it is not enough to verify URLs, security keys or use HTTPS, it will also be useful to check the site's general names in security certificates to compare it with the site domain in question ", said Miguel Angel Mendoza, Specialist in IT security in Latin America.

2. Cryptojacking

This threat began to be identified in August 2017 and in principle kidnapping processing the capacity of foreign computers to make money through mining cryptocurrency. One way to infect devices is through scripts that run on the user's browser, enough for users to visit websites that contain code so that their processors are used to damage some digital currencies. Cryptojacking began to have great activity towards the end of last year, becoming the most detected threat by ESET telemetry around the world between December 2017 and June 2018.

So far in 2018, in the Latin American region, almost half of the detection of JS / CoinMiner (signatures used by ESET solutions) is concentrated in two countries: Peru (30.72%) and Mexico (17.41). %), followed by Ecuador (8.89%), Brazil (7.73%) and Argentina (7.08%).

3. Malware

Malicious code continues to be one of the main threats, while it is also used to carry out attacks. According to the ESET 2018 Security Report, malware infections are presented as the main cause of security incidents in Latin American companies.

ESET Research Laboratories every day receives more than 300,000 unique malware samples, noting that this type of threat was developed for almost all operating systems currently in use. For example, the ESET laboratory identifies, on average, about 300 Android malware samples every month. In addition, malware samples specifically designed to affect devices called the Internet of Things are beginning to emerge; that after being compromised is used to carry out another attack.

4. Ciberextorsiones

During 2018, several e-mail scams appeared, focusing on deceiving users based on information that should be obtained that endangers them. In some of these campaigns There are special facts, which make users believe that it's not a hoax.

An example is a campaign where the user's password is the subject of the message, in an attempt to show that they have their personal data and that the blackmail they specified in the text of the letter is real. It is estimated that this special campaign managed to raise nearly half a million dollars. Another example of this type of fraud is that the e-mail comes to the user from his own account, which means that the attacker has access to a potential victim's account.

5. Exploitation of vulnerabilities

Towards the end of 2017, ESET highlighted that this was a joint year the highest number of vulnerabilities reported (14,714), far exceeding the records of previous yearsHowever, so far in 2018 this number has been exceeded. According to CVE Details, despite the fact that this year has not ended, more than 15,300 vulnerabilities have been registered.

In this context, the exploitation of several vulnerabilities also increases. For example, detection of EternalBlue, exploits used during the deployment of WannaCry, has increased. If this exploitation detection is compared during May 2017 with detection in July 2018 (the period with the most activity), there is an increase of almost 600%, where the ramsomware family and other types of malware try to take advantage of vulnerabilities in outdated systems.

"It is important to highlight the ways in which computer threats develop and various attacks that attempt to compromise assets, so that, from a security perspective, the use of protection technology, the application of good practices, and the use of technology are very important. the field of cyber security, "concluded Mendoza.


Source link