Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 28 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Positive Technologies analyzes Q3 2017 cyberthreats: cryptocurrency and ICOs in the crosshairs

by The Gurus
June 17, 2020
in Editor's News
Share on FacebookShare on Twitter

Experts at Positive Technologies note increased hacker interest in cryptocurrency wallets and initial coin offerings (ICOs), in which ordinary users and major companies alike run the risk of losing millions in just minutes.
By attacking the website of an initial coin offering, hackers can replace the address indicated for the ICO wallet with an address controlled by them. As a result, would-be investors are tricked into sending funds to the wrong recipient. Cryptocurrency has also created a new and stealthy way for criminals to monetize control of victims’ computers—they infect the computers with malware in order to create botnets that mine cryptocurrency on their behalf. So it is no surprise that the most expensive cyberattack in Q3 2017 also involved cryptocurrency: a vulnerability in an Ethereum client led to losses of around USD $30 million.
Cyber incidents are on the rise in the government sector—13% of attacks in Q3 2017 were aimed at government, which for the first time in two years exceeds the percentage aimed at financial companies (7%).
Cybercrime knows no borders: more and more attacks are targeting two, three, ten, or even more countries simultaneously.
Attacks on home users grew substantially in the outgoing quarter (32% versus 24% in the prior quarter). 75% of attacks on educational institutions during Q3 took place in September, while entertainment (restaurants, hotels, movie theaters, etc.) attracted hackers more during the summer months.
Malware attacks continued their growth, reaching 39% of the total. Attacks on industrial companies made up a substantial portion of these (the Dragonfly group, for example, continues to target the energy sector).
Exploitation of website vulnerabilities, such as by defacing government websites, is also popular. In August, such attacks hit 27 Malaysian government websites, a website of the Pakistani government, and around 40 websites in Venezuela.
In July, a massive data breach hit Equifax, an American credit reporting company, compromising the identity and financial information of 145.5 million customers in the U.S. alone.
Hackers also continue to refine malware used against ATMs and POS terminals. Avanti Markets went public in July with information about successful attacks on the company’s kiosks in the U.S., due to which client information was compromised.
“Malware was a factor in almost half of attacks. In our view, the main cause is the popularity of Ransomware as a Service,” says Positive Technologies analyst Olga Zinenko. “Website security is important like never before due to the boom in blockchain projects and ICOs. When an attacker seizes control of a website, changing the site’s content can cause losses of millions of dollars before anyone is able to notice. Given the increase in new ICOs, we expect to see more attacks on blockchain platforms by year’s end.”
The report, Cybersecurity Threatscape Q3 2017, can be found at the following link.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Alert Logic Launches Managed Rule Groups for AWS WAF to Provide Enhanced Protection Against WordPress Vulnerabilities

Next Post

Many cyber insurance policies will leave business ransomware victims out of pocket

Recent News

software security

Research reveals 80% of applications developed in EMEA contain security flaws

September 27, 2023
Cyber insurance

Half of organisations with cyber insurance implemented additional security measures to qualify for the policy or reduce its cost

September 27, 2023
Fraud and online banking

Akamai Research Finds the Number of Cyberattacks on European Financial Services More Than Doubled in 2023

September 27, 2023
ICS Reconnaissance Attacks – Introduction to Exploiting Modbus

ICS Reconnaissance Attacks – Introduction to Exploiting Modbus

September 27, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information