26 Jumada I 1446 - 27 November 2024
    
Sign up for newsletter
Eye of Riyadh
Technology & IT | Thursday 16 April, 2020 5:05 pm |
Share:

30% of Banking Malware Targets Corporate Users in KSA

In 2019, 773,943 users of Kaspersky solutions were attacked by banking Trojans. Of those users, a third (35.1%) were in the corporate sector. Middle Eastern corporate sector was affected too, with Egypt being the most targeted country and the highest in terms of the share of affected corporate users attacked by banking malware – 43%. This is among the findings from Kaspersky's analysis of the financial threat landscape. 

 

Banking Trojans or ‘bankers’ are one of the most widespread tools for cybercriminals as they focus on stealing money. Bankers usually search for users’ credentials for e-payment and online banking systems, hijacking one-time passwords, and then passing that data to the attackers.

 

A third of these attacks in 2019 targeted corporate users, an increase from the figure (24% - 25%) that has remained fairly consistent for the previous three years. According to experts, the rationale of this is clear: attacks on the B2B sector could not only provide access to banking or payment system accounts, but, through employee exposure, could also compromise a company’s financial resources.

 

The collected data also shows that Egypt held its position as the most targeted nation in Middle East in 2019, accounting for 43% corporate of users out of all attacked by banking malware. It is followed by Bahrain (41%), United Arab Emirates (with 37%), Qatar (35%), Kuwait (34%) and Saudi Arabia (30%).  

 

“While the overall number of attacks with bankers decreased in 2019, the growing interest for corporate users’ credentials indicates we are not yet seeing respite from financial threats. We therefore ask everyone to stay cautious when conducting financial operations online from PCs. While we are in the current peak of remote working during the coronavirus pandemic, it is especially important to not underestimate criminals’ desire for stealing money,” said Oleg Kupreev, security expert at Kaspersky.

 

The key findings of the report are:

 

Phishing:

 

  • In 2019, the share of financial phishing increased from 44.7% of all phishing detections to 51.4%.
  • Almost every third attempt to visit a phishing page blocked by Kaspersky products was related to banking phishing (27%).
  • The share of phishing-related attacks on payment systems and online stores accounted for almost 17% and over 7.5% respectively in 2019. This is more or less the same as 2018 levels.
  • The share of financial phishing encountered by Mac users fell slightly, accounting for 54%.

Banking malware (Windows):

 

  • In 2019, the number of users attacked with banking Trojans was 773,943 – a decrease compared to the 889,452 attacked in 2018.
  • 35.1% of users attacked with banking malware were corporate users – an increase from 24.1% in 2018.
  • Users in Russia, Germany, and China were attacked most frequently by banking malware.

Android banking malware:

 

  • In 2019, the number of users that encountered Android banking malware dropped to just over 675,000 from around 1.8 million.
  • Russia, South Africa, and Australia were the countries with the highest percentage of users attacked by Android banking malware.

Threats targeting businesses, such as banking Trojans and financial phishing, can and should be detected and blocked on a network level - even before they reach employee’s endpoints. In particular, the use of a secure internet gateway solution like Kaspersky Security for Internet Gateway, ensures secure internet traffic and transactions and prevents many types of malware and threats. Kaspersky solution has received positive honest customer feedback and been named a 2020 ‘Customers’ Choice for Secure Web Gateways’. 

 

In addition to this, Kaspersky experts advise businesses take the following measures against financial threats:

 

  • Invest in regular cybersecurity awareness training for employees to educate them not to click on links or open attachments received from untrusted sources. Conduct a simulated phishing attack to ensure that they know how to distinguish phishing emails.
  • Leverage advanced detection and response technologies, such as Kaspersky Endpoint Detection and Response - part of the Threat Management and Defense solution. It makes it possible to catch even unknown banking malware and gives security operation teams full visibility over the network and response automation.
  • Use mobile protection solutions or corporate internet traffic protection to ensure employees’ devices are not exposed to financial and other threats. The last one helps protect even those devices for which an anti-virus is not available
  • Provide your security operation center team with access to Threat Intelligence so it remains up to date with the latest tactics and tools used by cybercriminals.

 

Share:
Print
Post Your Comment
ADD TO EYE OF Riyadh
RELATED NEWS
MOST POPULAR