Zambia hints at fifth telco operator

A fifth telco
for Zambia?

Enough room says
industry regulator.

Thursday, Feb 20th

Cyber security: businesses at 'critical tipping point' say experts

Cyber security: businesses at 'critical tipping point' say experts

The cyber threat landscape has evolved and businesses are lagging behind in efforts to face the challenge head on, according to research released by IT security specialists and strategists including Fortinet, Intel Security and CheckPoint South Africa.

Threat reports detail how innovations (including IoT and the cloud computing), a global shortage of cybersecurity talent and regulatory pressures, as well as the difficulty in identifying ransomware and malware, have heightened the cyber security threat to businesses.

Derek Manky, global security strategist at Fortinet, says "the expanding attack surface enabled by technology innovations such as cloud computing and IoT devices, a global shortage of cybersecurity talent, and regulatory pressures continue to be significant drivers of cyber threats."

He adds, "The pace of these changes is unprecedented, resulting in a critical tipping point as the impact of cyber attacks are felt well beyond their intended victims in personal, political, and business consequences. Going forward, the need for accountability at multiple levels is urgent and real affecting vendors, governments, and consumers alike. Without swift action, there is a real risk of disrupting the progress of the global digital economy."

Intel Security's McAfee Labs Threats Report: December 2016 details how attackers are creating difficult-to-detect malware by infecting legitimate code with Trojans and leveraging that legitimacy to remain hidden as long as possible.

The December report also details the growth of ransomware, mobile malware, macro malware, Mac OS malware, and other threats in Q3 2016.

"One of the harder problems in the security industry is identifying the malicious actions of code that was designed to behave like legitimate software, with low false positives," said Vincent Weafer, Vice President of Intel Security's McAfee Labs. "The more authentic a piece of code appears, the more likely it is to be overlooked. Just as 2016 saw more ransomware become sandbox aware, the need to conceal malicious activity is driving a trend toward 'Trojanising' legitimate applications. Such developments place an ever greater workload on an organisation's SOC—where success requires an ability to quickly detect, hunt down, and eradicate attacks in progress."

2016: The Year of Ransomware?

According to McAfee Labs through the end of Q3, the number of new ransomware samples this year totalled 3,860,603, leading to an increase of 80% in total ransomware samples since the beginning of the year.

Beyond the leap in volume, ransomware exhibited notable technical advances in 2016, including partial or full disk encryption, encryption of websites used by legitimate applications, anti-sandboxing, more sophisticated exploit kits for ransomware delivery, and more ransomware-as-a-service developments, the company explains.

"Last year we predicted that the incredible growth in ransomware attacks in 2015 would continue into 2016," Weafer said.

South Africa targeted

Check Point has revealed that South Africa was among the countries impacted by a 10% increase in ransomware attacks in November, using Locky and Cryptowall.

As a result, South Africa moved up the list of 117 most attacked countries – to number 31 in November, from 58 in October, the company said.

In its monthly Global Threat Index, a ranking of the most prevalent malware families attacking organisations' networks, Check Point found both the number of active malware families and number of attacks remained close to an all-time high as the number of attacks on business networks continued to be relentless.

Continuing a trend first detected in October, Locky ransomware continued to increase in prevalence, with a further 10% increase in the number of attacks using this family – a pattern that was mirrored by the fifth most common malware, Cryptowall.

Locky, which started its distribution in February 2016, spreads mainly via spam emails containing a downloader disguised as a Word or Zip file attachment, which then downloads and installs the malware that encrypts the user files. Locky was the no.1 malware family in the largest amount of countries (34 countries compared to Conficker, which was the top malware in 28 countries).

"The year 2016 may indeed be remembered as 'the year of ransomware,' with both a huge jump in the number of ransomware attacks, a number of high profile attacks that generated wide media interest, and significant technical advances in this type of attack. On the other side of the ransomware attacks, greater cooperation between the security industry and law enforcement, and constructive collaboration between industry rivals truly began to deliver results in taking the fight to the criminals. As a result we expect the growth of ransomware attacks to slow in 2017," the company continues.

ALSO ON ITWEB AFRICA

Kyocera brings new levels of eco-friendly productivity to the workplace Published on 06 February 2020

Kyocera Document Solutions South Africa has launched a new range of A4 monochrome ECOSYS products, designed to help companies manage their print output more securely and efficiently than ever before, while significantly reducing their environmental impact.

Global blockchain alliance to support Africa's aviation parts industry Published on 18 February 2020

Stakeholders in Maintenance, Repair and Overhaul (MRO) chain to demonstrate how technology can be used to digitally manage parts.

Epsidon Technology Holdings announces acquisition of Nology Published on 19 February 2020

Epsidon Technology Holdings (Epsidon) announced its acquisition of Nology, a leading specialist value-added distributor of converged IP solutions.

What of Vodafone Ghana's economic future? Published on 12 February 2020

Transfer of control of the company to Vodacom Group reignites speculation over company's local listing.