sb-as logo
Story image

Malwarebytes reveals APAC countries most targeted by malware

24 Jan 2019

Endpoint protection solutions provider Malwarebytes has today released the third annual State of Malware Report, which analyses top malware threats from January through November 2018 and compares them with the same period in 2017.

The report identifies a sharp increase in business-based malware detections, including massive increases in backdoors, cryptocurrency miners, and the use of exploits against their endpoints. “The year 2018 was action-packed from start to finish,” says Malwarebytes Labs director Adam Kujawa. “It began with threat actors diversifying their cryptomining tactics; broadening their reach to Android, Mac and cryptomining malware; and experimenting with new innovations in browser-based attacks.

“The Asia-Pacific region was highly targeted by bad actors, with five countries among the top 10 countries with most business malware detections globally.”   Key findings for Asia-Pacific include:    1. Businesses took a hit, malware detections increased more than 270% Malware authors pivoted in the second half of 2018 to target organisations over consumers, recognising that businesses provided a bigger payoff.

Overall business detections of malware rose significantly over the last year—270%—primarily due to the increase in backdoors (5137%), cryptocurrency miners (1184%), and the use of exploits against their endpoints (3690%), suggesting a greater need to patch and secure endpoints.    2. Australia, Indonesia, Malaysia, Thailand and the Philippines all finished in the top 10 countries with most business detections globally. Five countries in APAC made the top 10 for the most business threat detections per country in 2018, by volume.

This includes Australia, which ranked first, Indonesia, Malaysia, Thailand and the Philippines, which ranked second, fifth, sixth, seventh and tenth on the global rankings respectively.

Indonesia, Malaysia and Thailand have been fending off an influx of backdoor malware in their business networks.

In Australia, the main threat was adware and cryptomining, a big reason to be concerned as many miners and adware families drop additional malware, modify system settings, slow down or use up computing power, or otherwise disrupt operations.   3. Cryptominers were the all-stars of the year In APAC, Malwarebytes saw a massive wave of cryptocurrency miners.

While cryptomining detections increased only by 7% globally, in Asia-Pacific, Malwarerbytes saw a 1184% increase year-over-year.

Threat actors seemingly abandoned all other forms of attack for experimentation in this new technique, spanning from desktop to mobile; Mac, Windows, and Android operating systems; and software and browser-based attacks.   4. WannaCry infections are still spreading in Asia-Pacific In the APAC region, the biggest ransomware threat is WannaCry infections that are still spreading to unpatched endpoints and laterally moving across networks.

The payload should be neutered, in the sense that the malware can install but won’t encrypt anything.

Overall, while ransomware isn’t the wide-ranging threat it was in 2017, there were more sophisticated attacks aimed at businesses, especially across education, manufacturing and government verticals.

Indeed, the main spike in numbers has been in the realm of the workplace.   5. Globally, education, government, manufacturing and healthcare were the top industries impacted by Trojans. When we zoom in on the Trojan category to look at its top family – Emotet, the industries shift.

Education, manufacturing and hospitality top the list.

The current trends with Trojans are likely to continue, while there are opportunities for criminals to exploit weak configurations and outdated assets.

However, the greater concern is the copycats and new generations of families that are likely going to dominate 2019 across verticals and around the globe.   Malwarebytes Asia-Pacific area vice president and managing director Jeff Hurmuses says, “We experienced another very active year for malware that shows no signs of stopping.”   “Attackers continued to shift their methodologies to follow the payload. We saw evidence of this with a strong focus on attacking businesses with insecure and unpatched networks.

From massive data breaches to ransomware attacks, businesses are experiencing what consumers have been dealing with, but on a larger scale,” he says.

Story image
Secureworks: Remote working exposes new security vulnerabilities
New vulnerabilities have been exposed as IT teams across the world respond to the ongoing COVID-19 pandemic.More
Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More
Story image
BlackBerry, Microsoft enter partnership for Teams integration
"Integrating BlackBerry AtHoc will ensure that any organisation managing critical events using Teams is able to contact, alert, and account for everyone within the organisation directly."More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Gartner reveals the top strategic tech trends for 2021
“CIOs are striving to adapt to changing conditions to compose the future business - this requires the organisational plasticity to form and reform dynamically. Gartner’s top strategic technology trends for 2021 enable that plasticity.”More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More