NEW DELHI: India ranked second, behind Singapore, in terms of 'drive-by download' attack volume in the Asia-Pacific region in 2019, according to a report by Microsoft<\/a>. “驾车下载”下载恶意代码攻击涉及到一个毫无防备的用户的电脑访问一个网站时或者填好表格。然后下载恶意代码是攻击者窃取密码或使用的财务信息。 新德里:印度排名第二,仅次于新加坡的“下载型”攻击卷在亚太地区,2019年的一份报告称微软。
'Drive-by download' attacks involve downloading malicious code onto an unsuspecting user's computer when they visit a website or fill up a form. The malicious code that is downloaded is then used by the attacker to steal passwords or financial information.
While the volume of such attacks in the Asia-Pacific region declined 27 per cent from 2018, India moved from the 11th position to the second spot (with 140 per cent increase), the report titled 'Microsoft Security Endpoint Report 2019' said.
It added that cybercriminals remain focused on stealing financial information or intellectual property.
Together with key financial hubs, Singapore and Hong Kong, India experienced an attack volume that was three times higher than the regional and global average, it said.
\"Cybercriminals capitalise on drive-by download technique to target the organisations and end-users with the objective to steal valuable financial information or intellectual property,\" Microsoft India Group Head and Assistant General Counsel (Corporate, External and Legal Affairs) Keshav Dhakad said in a virtual briefing.
He added that this is a likely reason for regional business hubs recording the highest volume of these threats.
Dhakad also said the high encounter rate does not necessarily translate into a high infection rate as the level of cyber hygiene and usage of genuine software prevent the systems from getting compromised.
The findings of the report are derived from an analysis of diverse Microsoft data sources, including eight trillion threat signals received and analysed by the company every day, covering a 12-month period, from January to December 2019.
According to the report, Asia-Pacific (APAC) continued to experience a higher-than-average encounter rate for malware and ransomware attacks — 1.6 and 1.7 times higher than the rest of the world, respectively.
\"India registered the 7th highest malware encounter rate across the region, at 5.89 per cent in the past year. This was 1.1 times higher than the regional average,\" it said.
The report added that India recorded the third highest ransomware encounter rate across the region, which was two times higher than the regional average.
This was despite a 35 per cent and 29 per cent decrease in malware and ransomware encounters, respectively, over the past year, it added.
Besides, India also recorded the second-highest cryptocurrency mining encounter rate in Asia-Pacific after Sri Lanka, even though the encounter rate declined 35 per cent from 2018, the report said.
During such attacks, victims' computers are infected with cryptocurrency mining malware, allowing criminals to leverage the computing power of their computers without their knowledge.
Dhakad said while overall cyber hygiene in India has improved, there is more to be done.
\"Typically, high malware encounters are a result of excessive usage of unlicensed and\/or pirated software, and proliferation of sites that illegitimately offer free software or content, such as video streaming,\" he added.
Dhakad also said consumer education is important and users should regularly patch and update programs and devices and be able to identify unsafe websites and illegitimate software.
Talking about trends around COVID-19, Dhakad said that of the millions of targeted phishing messages seen globally each day, roughly 60,000 include COVID-19-related malicious attachments or malicious uniform resource locators (URLs).
Attackers are impersonating established entities like the World Health Organization (WHO), Centers for Disease Control and Prevention (CDC), and the Department of Health to get into inboxes.
\"We found that COVID-19-themed threats are mostly retreads of existing attacks that have been slightly altered to tie to the pandemic. This means that attackers have been pivoting their existing infrastructure, like ransomware and phishing, to include COVID-19 keywords, to capitalise on people's fear,\" he said.
Once users click on these malicious links, attackers can infiltrate networks, steal information and monetise their attacks, he added.
He suggested that businesses should have strong tools to safeguard employees and infrastructure and ensure employee guidelines are communicated clearly to the staff.
Also, they should choose a trusted and a unified communication and collaboration application for audio\/video calling, team collaboration, and file sharing that ensures end-to-end encryption, he added.
Dhakad said individuals should update all devices with the latest security updates and use an antivirus or anti-malware service and should stay alert about the links and attachments in all forms of communication, e-mail, social media or chats, especially from unknown senders.
They should also use multi-factor authentication on all accounts and be educated on how to recognise phishing attempts and report suspected encounters, including watching out for spelling and bad grammar, and suspicious links and attachments from people they do not know, he added.
<\/p><\/body>","next_sibling":[{"msid":77253495,"title":"Hybrid new normal of work brings new challenges: Microsoft","entity_type":"ARTICLE","link":"\/news\/hybrid-new-normal-of-work-brings-new-challenges-microsoft\/77253495","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[{"msid":"77239978","title":"Haching","entity_type":"IMAGES","seopath":"tech\/internet\/india-sees-2nd-highest-drive-by-download-attack-volume-in-apac-in-2019-microsoft\/haching","category_name":"India sees 2nd highest drive-by download attack volume in APAC in 2019: Microsoft","synopsis":"Once users click on these malicious links, attackers can infiltrate networks, steal information and monetise their attacks.","thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-487192\/77239978.cms?width=150&height=112","link":"\/image\/tech\/internet\/india-sees-2nd-highest-drive-by-download-attack-volume-in-apac-in-2019-microsoft\/haching\/77239978"}],"msid":77253528,"entity_type":"ARTICLE","title":"India sees 2nd highest drive-by download attack volume in APAC in 2019: Microsoft","synopsis":"'Drive-by download' attacks involve downloading malicious code onto an unsuspecting user's computer when they visit a website or fill up a form. The malicious code that is downloaded is then used by the attacker to steal passwords or financial information.","titleseo":"telecomnews\/india-sees-2nd-highest-drive-by-download-attack-volume-in-apac-in-2019-microsoft","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":408,"shares":0,"engagementtimems":1938000,"url":"https:\/\/ettelecom.indiatimes.com\/telecomnews\/india-sees-2nd-highest-drive-by-download-attack-volume-in-apac-in-2019-microsoft\/articleshow\/77253528.cms"},"Alttitle":{"minfo":""},"artag":"PTI","artdate":"2020-07-30 08:52:40","lastupd":"2020-07-30 08:53:14","breadcrumbTags":["Microsoft","cyber criminals","malicious software","Hacking","cyber security","Internet"],"secinfo":{"seolocation":"telecomnews\/india-sees-2nd-highest-drive-by-download-attack-volume-in-apac-in-2019-microsoft"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2020-07-30" data-index="article_1">
印度把2日最高下载型攻击卷2019年在亚太地区:微软
“驾车下载”下载恶意代码攻击涉及到一个毫无防备的用户的电脑访问一个网站时或者填好表格。然后下载恶意代码是攻击者窃取密码或使用的财务信息。
这种攻击的体积在亚太地区从2018年下降了27%,印度从11日的位置搬到第二点(增加140%),该报告题为“2019年微软安全端点报告”说。
一起主要金融中心,新加坡和香港,印度经历了攻击卷三倍的地区和全球平均。
“网络罪犯利用驾车技术下载到目标与目的的组织和终端用户窃取有价值的财务信息或知识产权,“微软印度集团负责人和助理总法律顾问(企业、外部和法律事务)Keshav Dhakad在一个虚拟的新闻发布会上说。
他补充说,这是一个可能的原因为区域业务中心记录这些威胁的最高音量。
Dhakad还说,高接触率并不一定转化为高感染率的网络卫生和使用正版软件防止系统损害。
报告的结果是来自微软不同数据源的分析,包括八万亿威胁信号接收和分析公司的每一天,覆盖的12个月里,从1月到2019年12月。
根据这份报告,亚太地区继续体验恶意软件和攻击ransomware遇到率高于- 1.6和1.7倍高于世界其他国家,分别。
“印度注册第七届亚太地区恶意软件遇到率最高,为5.89%在过去的一年。这是高于地区平均水平的1.1倍,”它说。
报告补充说,印度最高记录第三ransomware遇到率在整个亚洲地区,地区平均水平的两倍。
这尽管是一个恶意软件和ransomware遇到下降35%和29%,分别在过去的一年中,它补充说。
除此之外,印度还记录第二cryptocurrency矿业遇到率在亚太地区斯里兰卡后,即使遇到率从2018年下降了35%,报告说。
在这样的攻击,受害者的电脑感染了cryptocurrency矿业恶意软件,允许罪犯利用他们的电脑的计算能力没有他们的知识。
Dhakad说,虽然印度的整体网络卫生改善了,还有更多的工作要做。
“恶意软件遇到高通常是由于过度使用未经授权和/或盗版软件,和非法的网站,提供免费软件或扩散内容,如视频,”他补充道。
Dhakad还表示,消费者教育是重要的,用户应定期补丁和更新程序和设备,并能够识别不安全的网站和非法软件。
谈论趋势COVID-19 Dhakad表示,全球数以百万计的有针对性的网络钓鱼信息见过的每一天,大约60000名包括COVID-19-related恶意附件或恶意的统一资源定位器(url)。
攻击者冒充建立实体世界卫生组织(世卫组织)、疾病控制和预防中心(CDC)和卫生部进入收件箱。
“我们发现COVID-19-themed威胁大多翻新现有的攻击已经稍微改变领带的大流行。这意味着攻击者已经旋转他们现有的基础设施,如ransomware和钓鱼,包括COVID-19关键词,利用人们的恐惧,”他说。
一旦用户点击这些恶意链接,攻击者可以渗透网络,窃取信息和货币化的攻击,他补充说。
他建议,企业应该有强大的工具来维护员工和基础设施,确保员工指南明确传达给员工。
同时,他们应该选择一个可信的和统一通信和协作应用程序音频/视频通话,团队协作,确保端到端的加密和文件共享,他补充说。
Dhakad说个人应该更新所有设备的最新安全更新和使用一个杀毒或反恶意软件服务,应该保持警惕的链接和附件所有形式的沟通、电子邮件、社交媒体或聊天,尤其是来自未知的发送者。
他们还应该使用多因素身份验证所有帐户和接受教育如何识别网络钓鱼和报告疑似接触,包括看拼写和语法错误,和可疑的链接和附件的人他们不知道,他补充说。
评论
现在评论 阅读评论(1)所有评论
找到这个评论进攻?
下面选择你的理由并单击submit按钮。这将提醒我们的版主采取行动