APJ Security Survey

Critical Industries at Risk in APJ

Dean Houari, Director of Security Technology and Strategy, Akamai

Ransomware groups shift focus to return-on-investment targeting critical industries with  204 Percent Increase in Ransomware Victims.

Key findings for the APJ region :

  • The top five critical industries in APJ that have been attacked by ransomware and are at further risk are manufacturing, business services, construction, retail, as well as energy, utilities, and telecommunications
  • Lockbit is the most prevalent ransomware in each industry in APJ, accounting for 60 percent of attacks in manufacturing, 55.8 percent in business services, 57.7 percent in construction, 45.8 percent in retail, and 28.6 percent in energy.
  • The CL0P ransomware group is aggressively exploiting Zero-Day vulnerabilities, like MOVEit, which contributed to the spike in ransomware victims in APJ in Q1 2023, and the ongoing ransomware events in June this year.
  • The report also found that the majority of ransomware victims in APJ are small-to-medium sized enterprises (SMEs) with a reported revenue of up to US$50 million.
  • Ransomware groups are increasingly targeting the exfiltration of files, which has become the primary source of extortion. This new tactic indicates file backup solutions are no longer a sufficient strategy to protect against ransomware.
  • Victims of multiple ransomware attacks were more than 6x more likely to experience the second attack within three months of the first attack.

Ransomware on the Move: Exploitation Techniques and the Active Pursuit of Zero-Days – Akamai Technologies‘s State of the Internet report, finds that the use of Zero-Day and One-Day vulnerabilities has led to a 204 percent increase in total ransomware victims between Q1 2022 and Q1 2023 in Asia-Pacific and Japan (APJ). The report also found that ransomware groups increasingly target the exfiltration of files, the unauthorised extraction or transfer of sensitive information, which has become the primary source of extortion. This new tactic indicates file backup solutions are no longer a sufficient strategy to protect against ransomware.

A deeper examination of the data reveals that essential infrastructure in the region is being actively targeted, as the top five critical industries in APJ that have been attacked by ransomware and are at further risk are manufacturing, business services, construction, retail, as well as energy, utilities, and telecommunications. Unless cybersecurity standards are strengthened, organizations in this sector will continue to be vulnerable to disruption.

“It’s imperative that both the private and public sectors across APJ strengthen collaboration to help organisations defend against ever-growing ransomware threats.”

Dean Houari, Director of Security Technology and Strategy, Akamai

The spike in ransomware attacks is due to adversaries shifting the emphasis of their modus operandi from phishing to vulnerability abuse in order to exploit unknown security threats and infiltrate business internal networks to deploy ransomware. LockBit has been the most subscribed Ransomware-as-a-Service and now dominates the ransomware landscape in APJ, accounting for 51 percent of attacks from Q3 2021 to Q2 2023 – followed by the ALPHV and CL0P ransomware groups.

Other key findings of Ransomware on the Move: Exploitation Techniques and the Active Pursuit of Zero-Days include:

  • Lockbit is the most prevalent ransomware in each industry in APJ, accounting for 60 percent of attacks in manufacturing, 55.8 percent in business services, 57.7 percent in construction, 45.8 percent in retail, and 28.6 percent in energy.
  • The CL0P ransomware group is aggressively exploiting Zero-Day vulnerabilities, like MOVEit, which contributed to the spike in ransomware victims in APJ in Q1 2023, and the ongoing ransomware events in June this year.
  • The report also found that the majority of ransomware victims in APJ are small-to-medium sized enterprises (SMEs) with a reported revenue of up to US$50 million.
  • Ransomware groups are increasingly targeting the exfiltration of files, which has become the primary source of extortion. This new tactic indicates file backup solutions are no longer a sufficient strategy to protect against ransomware.
  • Victims of multiple ransomware attacks were more than 6x more likely to experience the second attack within three months of the first attack.

“Adversaries behind ransomware attacks continue to evolve their techniques and strategies striking at the heart of organisations by exfiltrating their critical and sensitive information,” said Dean Houari, Director of Security Technology and Strategy, at Akamai. “It’s imperative that both the private and public sectors across APJ strengthen collaboration to help organisations defend against ever-growing ransomware threats.”

“Use of Zero-Day and One-Day vulnerabilities has led to a 204 percent increase in total ransomware victims between Q1 2022 and Q1 2023 in Asia-Pacific and Japan (APJ).”

Dean Houari, Director of Security Technology and Strategy, Akamai

“Businesses – especially SMEs in APJ – must work to adopt a zero trust architecture starting with software defined microsegmentation in order to effectively mitigate ever evolving cyber attacks as well as Ransomware-as-a-Service. By doing so, they can successfully protect their critical assets, business reputation, and ensure business continuity regardless of the type of attack tool deployed by cyber criminal gangs”, he concluded.

Related posts

Fortinet signs Secure by Design Pledge

enterpriseitworld

Beyond Phishing: How AI is Amplifying Social Engineering Attacks

enterpriseitworld

IBM to Deliver Consulting Services across Palo Alto’s Security Platforms

enterpriseitworld
x