New Delhi: Microsoft<\/a> blocked over 13 billion malicious and suspicious mails in 2019, of which more than 1 billion were phishing<\/a> credential attacks<\/a>. 新德里消息:微软了130亿多个恶意和可疑邮件2019年,超过10亿人网络钓鱼凭证的攻击。
In 2020, the tech giant is busy tackling misinformation around Covid-19 as cybercriminals pivoted lures to imitate trusted sources like the World Health Organisation (WHO) and other national health organisations, to get users to click on malicious links and attachments.
Covid-themed attacks are targeting prominent governmental healthcare, academic, and commercial organisations to perform reconnaissance on their networks or people, according to Microsoft's annual Digital Defense Report.
\"In the past year, 90 per cent of nation-state notifications have been sent to organisations that do not operate critical infrastructure -- including non-governmental organisations (NGOs), advocacy groups, human rights organisations, and think tanks,\" it said.
China, the US and Russia were hit the hardest but every country in the world saw at least one Covid-19-themed attack.
The report found that threat actors<\/a> have rapidly increased in sophistication over the past year, using techniques that make them harder to spot, threatening even the savviest targets.
The data were gathered from over 1.2 billion PCs, servers and Internet<\/a> of Things (IoT) devices that accessed Microsoft services, as well as 630 billion authentication events, 470 billion emails analyzed for threats, and more than 18 million URLs scanned.
\"Cybercriminals are opportunistic and have capitalised on interest and fear related to the Covid-19 pandemic and other disruptive events.
\"They have also focused on targeting their ransomware<\/a> activities toward entities that cannot afford to be offline or without access to records during critical periods of the pandemic, like hospitals and medical research institutions,\" said Mary Jo Schrade, Assistant General Counsel, Microsoft Digital Crimes Unit, Asia.
Since 2010, Microsoft's Digital Crimes Unit has collaborated with law enforcement and other partners on 22 malware<\/a> disruptions, resulting in over 500 million devices rescued from cybercriminals.
With ransomware, cybercriminals leverage occasions such as holidays, that will impact an organisation's ability to make changes (such as patching) to harden their networks.
\"They are aware of business needs that will make organizations more willing to pay ransoms than incur downtime, such as during billing cycles in the health, finance, and legal industries - and have exploited the Covid-19 crisis to demand ransom\".
Cybercriminals are also targeting employees with sophisticated phishing campaigns designed to capture their login credentials.
\"During the first half of 2020, there was an increase in identity-based attacks using brute force on enterprise accounts,\" Microsoft said.
Microsoft warned that IoT threats are constantly expanding and evolving, with the first half of 2020 having witnessed an approximate 35 per cent increase in total attack volume compared to the second half of 2019.
To trick people into giving up their credentials, attackers often send emails imitating top brands.
\"Organisations should adopt stronger cyber hygiene practices and tools to safeguard employees and infrastructure. These include adopting multi-factor authentication, using good email hygiene (including limiting or disabling auto-forwarding of emails), timely patching and updating of apps and software,\" Schrade elaborated.
<\/p><\/body>","next_sibling":[{"msid":78506026,"title":"Microsoft to build hub for cloud services in Greece","entity_type":"ARTICLE","link":"\/news\/microsoft-to-build-hub-for-cloud-services-in-greece\/78506026","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":78506073,"entity_type":"ARTICLE","title":"Microsoft blocked 13 billion malicious emails in 2019","synopsis":"Microsoft blocked over 13 billion malicious and suspicious mails in 2019, of which more than 1 billion were phishing credential attacks.","titleseo":"telecomnews\/microsoft-blocked-13-billion-malicious-emails-in-2019","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":140,"shares":0,"engagementtimems":700000},"Alttitle":{"minfo":""},"artag":"IANS","artdate":"2020-10-06 08:50:30","lastupd":"2020-10-06 08:51:06","breadcrumbTags":["Microsoft","credential attacks","phishing","risk management","Malware","threat actors","Ransomware","Internet"],"secinfo":{"seolocation":"telecomnews\/microsoft-blocked-13-billion-malicious-emails-in-2019"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2020-10-06" data-index="article_1">
2020年,科技巨头正忙着处理错误信息在Covid-19网络罪犯枢轴鱼饵模仿可信来源像世界卫生组织(世卫组织)和其他国家卫生组织,让用户点击恶意链接和附件。
Covid-themed攻击是针对突出的政府医疗、学术和商业组织对其网络进行侦察或人,根据微软的年度数字国防报告。
中国、美国和俄罗斯打击最严重但世界上每个国家都看到至少一个Covid-19-themed攻击。
该报告发现,威胁的演员复杂性迅速增长在过去的一年里,使用技术,使他们更难,威胁甚至最精明的目标。
收集的数据来自12亿多个个人电脑、服务器和互联网的事情(物联网)设备,访问微软服务,以及6300亿年认证事件,4700亿封电子邮件威胁分析,扫描和超过1800万的url。
“网络犯罪机会,资本化的利息和恐惧相关Covid-19流行和其他破坏性事件。
“他们也关注目标ransomware活动向实体不能脱机或没有访问记录大流行的重要时期,像医院和医学研究机构,”助理总法律顾问Mary Jo Schrade说,微软数字犯罪单位,亚洲。
自2010年以来,微软的数字犯罪单位22日与执法和其他合作伙伴恶意软件中断,导致超过5亿的设备从网络罪犯救出。
ransomware,网络罪犯利用场合等假期,这将影响一个组织的能力进行更改(如修补)来强化他们的网络。
“他们意识到业务需求,这将使组织更愿意支付赎金比造成停机,在计费周期等健康、金融、和法律行业,利用Covid-19危机要求赎金”。
网络犯罪也针对员工复杂的钓鱼活动,旨在捕捉他们的登录凭证。
“在2020年上半年,增加基于标识的使用蛮力攻击企业账户,”微软说。
微软警告说,物联网的威胁正在不断扩大和发展,与2020年上半年目睹一个近似攻击总额增加35%比2019年下半年。
诱骗人们放弃他们的凭证,攻击者经常发送电子邮件模仿顶级品牌。
“组织应该采取更强的网络卫生实践和工具维护员工和基础设施。这些包括采用多因素身份验证,使用良好的邮件卫生(包括限制或禁用auto-forwarding电子邮件),及时修补和更新的应用程序和软件,“Schrade阐述了。
New Delhi: Microsoft<\/a> blocked over 13 billion malicious and suspicious mails in 2019, of which more than 1 billion were phishing<\/a> credential attacks<\/a>.
In 2020, the tech giant is busy tackling misinformation around Covid-19 as cybercriminals pivoted lures to imitate trusted sources like the World Health Organisation (WHO) and other national health organisations, to get users to click on malicious links and attachments.
Covid-themed attacks are targeting prominent governmental healthcare, academic, and commercial organisations to perform reconnaissance on their networks or people, according to Microsoft's annual Digital Defense Report.
\"In the past year, 90 per cent of nation-state notifications have been sent to organisations that do not operate critical infrastructure -- including non-governmental organisations (NGOs), advocacy groups, human rights organisations, and think tanks,\" it said.
China, the US and Russia were hit the hardest but every country in the world saw at least one Covid-19-themed attack.
The report found that threat actors<\/a> have rapidly increased in sophistication over the past year, using techniques that make them harder to spot, threatening even the savviest targets.
The data were gathered from over 1.2 billion PCs, servers and Internet<\/a> of Things (IoT) devices that accessed Microsoft services, as well as 630 billion authentication events, 470 billion emails analyzed for threats, and more than 18 million URLs scanned.
\"Cybercriminals are opportunistic and have capitalised on interest and fear related to the Covid-19 pandemic and other disruptive events.
\"They have also focused on targeting their ransomware<\/a> activities toward entities that cannot afford to be offline or without access to records during critical periods of the pandemic, like hospitals and medical research institutions,\" said Mary Jo Schrade, Assistant General Counsel, Microsoft Digital Crimes Unit, Asia.
Since 2010, Microsoft's Digital Crimes Unit has collaborated with law enforcement and other partners on 22 malware<\/a> disruptions, resulting in over 500 million devices rescued from cybercriminals.
With ransomware, cybercriminals leverage occasions such as holidays, that will impact an organisation's ability to make changes (such as patching) to harden their networks.
\"They are aware of business needs that will make organizations more willing to pay ransoms than incur downtime, such as during billing cycles in the health, finance, and legal industries - and have exploited the Covid-19 crisis to demand ransom\".
Cybercriminals are also targeting employees with sophisticated phishing campaigns designed to capture their login credentials.
\"During the first half of 2020, there was an increase in identity-based attacks using brute force on enterprise accounts,\" Microsoft said.
Microsoft warned that IoT threats are constantly expanding and evolving, with the first half of 2020 having witnessed an approximate 35 per cent increase in total attack volume compared to the second half of 2019.
To trick people into giving up their credentials, attackers often send emails imitating top brands.
\"Organisations should adopt stronger cyber hygiene practices and tools to safeguard employees and infrastructure. These include adopting multi-factor authentication, using good email hygiene (including limiting or disabling auto-forwarding of emails), timely patching and updating of apps and software,\" Schrade elaborated.
<\/p><\/body>","next_sibling":[{"msid":78506026,"title":"Microsoft to build hub for cloud services in Greece","entity_type":"ARTICLE","link":"\/news\/microsoft-to-build-hub-for-cloud-services-in-greece\/78506026","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":78506073,"entity_type":"ARTICLE","title":"Microsoft blocked 13 billion malicious emails in 2019","synopsis":"Microsoft blocked over 13 billion malicious and suspicious mails in 2019, of which more than 1 billion were phishing credential attacks.","titleseo":"telecomnews\/microsoft-blocked-13-billion-malicious-emails-in-2019","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":140,"shares":0,"engagementtimems":700000},"Alttitle":{"minfo":""},"artag":"IANS","artdate":"2020-10-06 08:50:30","lastupd":"2020-10-06 08:51:06","breadcrumbTags":["Microsoft","credential attacks","phishing","risk management","Malware","threat actors","Ransomware","Internet"],"secinfo":{"seolocation":"telecomnews\/microsoft-blocked-13-billion-malicious-emails-in-2019"}}" data-news_link="//www.iser-br.com/news/microsoft-blocked-13-billion-malicious-emails-in-2019/78506073">
评论
现在评论 阅读评论(1)所有评论
找到这个评论进攻?
下面选择你的理由并单击submit按钮。这将提醒我们的版主采取行动