Cyber Attacks on Southeast Asian Organizations on the Rise

FireEye, Inc. (NASDAQ: FEYE) and Singapore Telecommunications Limited (Singtel) on 19 November released a new report on advanced cyber attacks against organizations in Southeast Asia. In the first half of the year, organizations observed in the region faced a 45 percent higher risk of dealing with a targeted cyber attack than the global average. In the prior six-month period, they faced only a 7 percent higher risk.

Across the region, 29 percent of observed organizations were targeted with advanced cyber attacks in the first half of 2015. Thailand and the Philippines were hardest hit, with 40 percent and 39 percent of observed organizations exposed to these attacks, respectively.

Percentage of FireEye customers observed to have been affected by targeted malware January to June 2015

Percentage of FireEye customers observed to have been affected by targeted malware January to June 2015

More than one-third of malware detections associated with advanced persistent threat (APT) groups originated within the entertainment, media and hospitality industries. By targeting media organizations, threat groups can gain access to news before it is published and potentially identify undisclosed sources.

FireEye observed at least 13 APT groups targeting national government organizations and at least four APT groups targeting regional or state governments around the world.

“Espionage isn’t new but it is increasingly conducted online, and Southeast Asia is a hot spot,” said Eric Hoh, president for Asia Pacific Japan at FireEye. “Geopolitics can drive cyber attacks. As Southeast Asia becomes a larger economic player on the world stage and tensions flare in the South China Sea, organizations should be prepared for targeted attacks.”

William Woo, Managing Director, Enterprise Data and Managed Services at Singtel said, “The report emphasizes the frequency and sophistication of cyber attacks against all types of industries and enterprises in the region. The risk of attack, faced by regional enterprises, is higher than the global average. Therefore these enterprises must prioritize reinforcing their cyber defences. Even though APT attacks can be discovered within a shorter timeframe than before, which is currently after 205 days, this still leaves enterprises wide open to malicious activity within their breached environment.”

Threat intelligence is an important tool for organizations seeking to stay ahead of attackers. The report contains insights into recent developments in Southeast Asia’s cyber threat landscape, such as groups targeting prominent institutions to gather political and economic intelligence, the detection of a known cyber espionage campaign, and threat actors’ evolving techniques to evade detection.

State-owned bank compromised

FireEye observed malware beaconing from a state-owned bank in Southeast Asia. FireEye Threat Intelligence believes the malware, called CANNONFODDER, is most likely used by Asian cyber threat groups to collect political and economic intelligence. In late-2014, FireEye observed the malware beaconing from an Asian telecommunications company. In mid-2014, the company observed threat actors sending spear phishing emails with malicious attachments to employees of an Asian government.

Decade-long cyber espionage campaign detected

In April 2015, FireEye released a report documenting an advanced persistent threat group referred to as APT30, which conducted a cyber espionage operation against businesses, governments and journalists in Southeast Asia for 10 years. This group’s malware, called Lecna, comprised 7 percent of all detections at FireEye customers in Southeast Asia in the first half of 2015.

Source: FireEye Inc.

 

Comments

comments




Education Guide 2017

Please provide an email address where we should send the download link.