{"id":828,"date":"2023-06-19T15:15:58","date_gmt":"2023-06-19T07:15:58","guid":{"rendered":"https:\/\/www.info-trek.com\/blog\/?p=828"},"modified":"2024-05-02T12:10:12","modified_gmt":"2024-05-02T04:10:12","slug":"cyberattacks-gains-advantage-against-unpreparedness","status":"publish","type":"post","link":"https:\/\/www.info-trek.com\/blog\/cyberattacks-gains-advantage-against-unpreparedness\/","title":{"rendered":"Cyberattacks Gains Advantage Against Unpreparedness"},"content":{"rendered":"\n<p>Cyberattacks exist in many forms. They employed different modes of attacks, but the goal remain largely similar \u2013 deliberate network or computer security breach for sensitive data.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.info-trek.com\/blog\/wp-content\/uploads\/2019\/07\/hacker-1944688_1280-1024x682.jpg\" alt=\"cyberattacks\" class=\"wp-image-6008\"\/><\/figure>\n\n\n\n<p>Microsoft estimated that cybersecurity threats cost result potential loss of&nbsp;<a href=\"https:\/\/news.microsoft.com\/en-my\/2018\/07\/12\/cybersecurity-threats-to-cost-organizations-in-malaysia-us12-2-billion-in-economic-losses\/\">USD12.2 billion<\/a>&nbsp;in Malaysian organizations. The study found that a large-sized organization is likely to suffer loss of USD22.8 million due to the lacked of preparedness. In 2015 alone, twelve&nbsp;<a href=\"https:\/\/www.thestar.com.my\/business\/business-news\/2017\/05\/17\/cyber-attack-eases-hacking-group-threatens-to-sell-code\/\">cyberattack incidents<\/a>&nbsp;were reported involving local corporations.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.info-trek.com\/blog\/wp-content\/uploads\/2019\/07\/business-3324394_1280-1024x578.jpg\" alt=\"cyberattacks\" class=\"wp-image-6011\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Timeless Tactics<\/strong><\/h3>\n\n\n\n<p>Their terminologies may elude public consciousness but the tactics are not new. In addition, they continue to evolve sophisticatedly as public awareness slowly gain momentum. It is estimated that cybersecurity threats will result loss of&nbsp;<a href=\"https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/\">USD6 trillion<\/a>&nbsp;worldwide thus proving the issue will subsist.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Common Cyberattacks:<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks<\/strong><\/h4>\n\n\n\n<p>An attempt whereby system resources is overwhelmed thereby disabling its ability to handle service requests. This method stood out as it blocked out access to the website, Thus, the attacker wouldn\u2019t gained any immediate benefit but merely from satisfaction of disrupting the website.<\/p>\n\n\n\n<p>DDoS is not foreign to Malaysians. Election season hype saw that&nbsp;<a href=\"https:\/\/www.hrw.org\/news\/2013\/05\/01\/malaysia-violence-cyber-attacks-threaten-elections\">Radio Free Malaysia, Radio Free Sarawak, and Sarawak Report&nbsp;<\/a>were taken apart in 2013. Intentional disruption on the distribution of information is to be blame.&nbsp;<a href=\"https:\/\/www.theedgemarkets.com\/article\/bursa-malaysia-website-target-distributed-denial-service-attack-0\">Bursa Malaysia<\/a>&nbsp;also suffered a same fate in 2012. More recently, encrypted messaging service&nbsp;<a href=\"https:\/\/telegram.org\/\">Telegram<\/a>&nbsp;suffered a&nbsp;<a href=\"https:\/\/techcrunch.com\/2019\/06\/12\/telegram-faces-ddos-attack-in-china-again\/\">DDoS attack<\/a>&nbsp;in the wake of anti-government protest in Hong Kong.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Man-in-the-middle (MiTM) attack<\/strong><\/h4>\n\n\n\n<p>A MitM attack takes place when a hacker positioned itself between the client communications\u2019 and the server.<\/p>\n\n\n\n<p>Session hijacking: The attacker hijacks a session between a client and network server. IP address of the client will be substituted while the server continues the session.<\/p>\n\n\n\n<p>IP spoofing: The system will be tricked into communicating with the attacker, and to provide the attacker with access to it.<\/p>\n\n\n\n<p>Malaysia Airlines experienced this attack on their&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/hacked-or-spoofed-digging-into-the-malaysia-airlines-website-compromise\">defaced website<\/a>. While the domain name is not changed, visitors were directed to a different website. The&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/us-central-command-hack-a-warning-for-high-profile-accounts\">CENTCOM incident<\/a>&nbsp;were carried out by a concerted effort of hackers on multiple social media accounts.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Phishing attack<\/strong><\/h4>\n\n\n\n<p>Phishing attack is an attempt of sending legit-looking e-mails to individuals with the goal of gaining personal information or motivate them to do something. The e-mail would try to trick users into downloading malware into PC or visit an illegitimate website. To accomplish successful phishing attack, a hacker would employ technical trickery and social engineering to trap users.<\/p>\n\n\n\n<p>Users are usually advised to ignore to suspicious e-mails as highlighted by Bank Negara. The hackers&nbsp;<a href=\"http:\/\/www.bnm.gov.my\/index.php?ch=en_announcement&amp;pg=en_announcement&amp;ac=697&amp;lang=en\">impersonated the Central Bank<\/a>&nbsp;and attempted to get users to visit dubious websites for malicious activities. In 2012 alone, Malaysians suffer&nbsp;<a href=\"https:\/\/www.malaymail.com\/news\/money\/2013\/07\/01\/malaysia-lost-rm2m-to-phishing-last-year-says-mcmc\/489327\">RM2 million loss<\/a>&nbsp;to phishing scams according to MCMC.<\/p>\n\n\n\n<p><a href=\"https:\/\/marketing.info-trek.com\/acton\/media\/32501\/comptia-cybersecurity-certification-info-trek\">See what CompTIA cybersecurity training can do for you. Download free whitepapers and read up on cybersecurity fundamentals.<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Password attack<\/strong><\/h4>\n\n\n\n<p>A common rule we encounter \u2013 Password setup ideally should be a mixture of small and big capital letters, symbols, alphabets, plus numbers. This makes a strong password. Unfortunately, not many heed the advice. The Verizon Data Breach Investigations Report (DBIR) 2017 found that&nbsp;<a href=\"https:\/\/www.cso.com.au\/mediareleases\/29642\/hacked-passwords-cause-81-of-data-breaches\/\">81% of data breaches<\/a>&nbsp;were caused by hacked passwords. In consequence, enterprises would likely face USD $5 million in data breach loss which is preventable in the first place.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How do the hackers succeed?<\/h3>\n\n\n\n<p><em>Brute force<\/em>: Password-guessing technique employed to gain correct combination randomly. The attacker may attempt to use a person\u2019s name, pet\u2019s name, hometown, and others.<\/p>\n\n\n\n<p><em>Dictionary attack<\/em>: A dictionary of common passwords will be used to gain access. A correct password may be generated by cross referencing the encrypted file containing passwords with the aforementioned dictionary.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Malware<\/strong><\/h4>\n\n\n\n<p>Malwares are often unwanted softwares that are installed in the PC without your consent. Users may encounter this during visit to less legitimate websites whereby they are invited to download a software.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.info-trek.com\/blog\/wp-content\/uploads\/2019\/07\/Banner-01virus-1.png\" alt=\"cyberattacks\" class=\"wp-image-6010\"\/><\/figure>\n\n\n\n<p>The potential power of virus is demonstrated via&nbsp;<a href=\"https:\/\/www.symantec.com\/blogs\/feature-stories\/wannacry-lessons-learned-1-year-later\">WannaCry ransomware<\/a>&nbsp;in 2017. It caused mass disturbance worldwide with financial loss estimated at USD4 billion. The cyberattack also crippled thousands of&nbsp;<a href=\"https:\/\/www.scmp.com\/news\/china\/policies-politics\/article\/2094377\/tens-thousands-chinese-firms-institutes-affected\">companies<\/a>&nbsp;in China and Hong Kong. Variants of WannaCry soon ensue to overcome rising rectification measures against it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cybersecurity in Malaysia<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/themalaysianreserve.com\/2018\/04\/05\/lack-of-talent-remains-the-biggest-issue-in-cyber-security\/\">Lack of talent<\/a>&nbsp;in cybersecurity industry posed a major setback for enterprises nationwide. The digital economy demand greater manpower supply but the demand was not met due to insufficient manpower.<\/p>\n\n\n\n<p>Interestingly, according to expert insight by&nbsp;<a href=\"https:\/\/theaseanpost.com\/article\/southeast-asias-cybersecurity-emerging-concern\">AT Kearney<\/a>, Malaysia is one of three global hotspots to be used as launchpads for cyberattacks. It was also noted that organizations in Asia face 80% chance of attack by hackers.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Prevention Better Than PR Meltdown<\/strong><\/h4>\n\n\n\n<p>Cyberattacks do more than financial loss because it entails a series of mishaps for the unprepared. Forbes Insights\u2019&nbsp;<a href=\"https:\/\/images.forbes.com\/forbesinsights\/StudyPDFs\/IBM_Reputational_IT_Risk_REPORT.pdf\">Fallout: The Reputational Impact of IT Risk<\/a>&nbsp;reported that 46% of companies were left with damaged reputations and brand value after a breach.<\/p>\n\n\n\n<p>Hence, it is essential to sustain consumer trust in an enterprise. Lack of cybersecurity specialists may be a small setback. However, the offset is presented in professional training to develop new skills.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Training<\/strong><\/td><td><strong>Date<\/strong><\/td><\/tr><tr><td><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.info-trek.com\/details\/CompTIA-Security-\/4808\" target=\"_blank\">CompTIA Security+<\/a><\/strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.info-trek.com\/details\/CompTIA-Security-\/4808\" target=\"_blank\"><\/a><\/td><td>7-11 October 2019<\/td><\/tr><tr><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.info-trek.com\/details\/CompTIA-Cybersecurity-Analyst-(CySA-)\/10918\" target=\"_blank\"><strong>CompTIA Cybersecurity Analyst<\/strong><\/a><\/td><td>7-11 October 2019<\/td><\/tr><tr><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.info-trek.com\/details\/CompTIA-Advanced-Security-Practitioner-(CASP-)\/10919\" target=\"_blank\"><strong>CompTIA Advanced Security Practitioner<\/strong><\/a><\/td><td>25-29 November 2019<\/td><\/tr><tr><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.info-trek.com\/details\/CompTIA-PenTest-\/10920\" target=\"_blank\"><strong>CompTIA PenTest+<\/strong><\/a><\/td><td>21-25 October 2019<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks exist in many forms. They employed different modes of attacks, but the goal remain largely similar \u2013 deliberate network or computer security breach for sensitive data. Microsoft estimated that cybersecurity threats cost result potential loss of&nbsp;USD12.2 billion&nbsp;in Malaysian organizations. The study found that a large-sized organization is likely to suffer loss of USD22.8 million [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":384,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/comments?post=828"}],"version-history":[{"count":1,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/828\/revisions"}],"predecessor-version":[{"id":829,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/828\/revisions\/829"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/media\/384"}],"wp:attachment":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/media?parent=828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/categories?post=828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/tags?post=828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}