Story image

Microsoft: Asia's emerging economies vulnerable to malware

05 Sep 17

Asia’s emerging economies such as Bangladesh, Indonesia and Myanmar are amongst the world’s most vulnerable to malware and other cyber threats, according to findings from Microsoft’s latest Global Security Intelligence Report.

The report shows that Bangladesh, Pakistan, Cambodia, Indonesia and Mongolia were the most at risk in terms of malware encounter rates, while Hong Kong, Singapore, Australia, New Zealand and Japan were least at risk. Japan was rated as the safest country in the world.

Across Bangladesh, Pakistan, Cambodia and Indoensia, one in four computers running real-time Microsoft security products reported a malware encounter between January and March 2017.

According to Keshav Dhakad, Microsoft Asia’s assistant General Counsel and regional director, Digital Crimes Unit (DCU), digital transformation brings profound societal impacts, but users must first trust the technology.

Myanmar, Nepal, Thailand and Vietnam all had an average malware encounter rate of more than 20% in the first quarter – more than double the global average of 9%.

Taiwan hosted the most drive-by download pages with malware in its code.

Japan and China have fared best in terms of avoiding ransomware encounter rates but South Korea had the second highest rate in the world.

The most commonly encountered ransomware was Win32/Spora, which encrypts files with a number of extensions including .doc, .jpg, .docx, .pdf, .xlsx and .zip.

Major headline attacks like WannaCry and NotPetya were ‘disproportionally concentrated’ in Europe and most Asia markets were not heavily impacted by the threats.

According to Microsoft, attackers take GDP, average age of computer users and available payment methods as factors when considering attacks.

Microsoft says that as the threat landscape grows, organisations need solid cybersecurity architecture.

“In today’s digital age, security cannot be an afterthought. It must be “built-in”, all-inclusive and intelligent. By making security a top priority, we can build greater trust in technology and enable digital transformation to reach its fullest potential and fulfil its grandest ambitions,” Keshav says.

Microsoft recommends the following best practices:

1. Do not work in public Wi-Fi hotspots where attackers could eavesdrop on digital communications, capture logins and passwords, and access personal data.
2. Regularly update the operating system and other software programs to ensure the latest patches are installed. This reduces the risk of vulnerability exploitation. Users should also install the most recent release of Windows 10 to take advantage of its improved hardening and security mitigations.
3. Reduce the risk of credential compromise by educating users on why they should avoid simple passwords and enforcing multi-factor authentication methods.
4. Enforce security policies that control access to sensitive data and limit corporate network access to appropriate users, locations, devices, and operating systems. 

Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.