Skip to content

ESET Threat Report: H2 2023 full of significant security incidents, AI-themed attacks, and Android spyware cases

  • ESET has released its latest Threat Report, which summarizes threat landscape trends seen in ESET telemetry from June 2023 through November 2023.
  • Cl0p, a notorious cybercriminal group known for carrying out ransomware attacks on a major scale, launched the extensive “MOVEit hack,” which surprisingly did not involve ransomware deployment.
  • ESET Research has identified specific campaigns targeting users of AI tools such as ChatGPT and the OpenAI API.
  • SpinOk spyware increased the overall count of Android spyware cases.
  • Android/Pandora malware compromised smart TVs, TV boxes, and mobile devices to utilize them for DDoS attacks.

BRATISLAVA — December 19, 2023 — ESET has released its latest Threat Report, which summarizes threat landscape trends seen in ESET telemetry and from the perspective of ESET threat detection and research experts, from June 2023 through November 2023. The second half of 2023 witnessed significant cybersecurity incidents. Cl0p, a notorious cybercriminal group known for carrying out ransomware attacks on a major scale, garnered attention via its extensive “MOVEit hack,” which surprisingly did not involve ransomware deployment. In the IoT landscape ESET researchers have identified a kill switch that had been used to successfully render the Mozi IoT botnet nonfunctional. Amidst the prevalent discussion regarding AI-enabled attacks, ESET has identified specific campaigns targeting users of tools such as ChatGPT and the OpenAI API. With spyware, there has been a significant increase in Android spyware cases, mainly attributed to the presence of the SpinOk threat.

“The Cl0p attack targeted numerous organizations, including global corporations and US governmental agencies. A key shift in Cl0p’s strategy was its move to leak stolen information to public websites in cases where the ransom was not paid, a trend also seen with the ALPHV ransomware gang,” explains ESET Director of Threat Detection Jiří Kropáč.

A new threat against IoT devices, Android/Pandora, compromised Android devices — including smart TVs, TV boxes, and mobile devices — and used them for DDoS attacks. ESET Research also noticed a considerable number of attempts to access malicious domains with names resembling “ChatGPT,” seemingly in reference to the ChatGPT chatbot. Threats encountered via these domains include web apps that insecurely handle OpenAI API keys, emphasizing the importance of protecting the privacy of users’ OpenAI API keys.

Among Android threats, SpinOK spyware is distributed as a software development kit and is found within various legitimate Android applications. On a different front, the second most recorded threat in H2 2023 is malicious JavaScript code detected as JS/Agent, which continues to be injected into compromised websites.

On the other hand, the increasing value of bitcoin has not been accompanied by a corresponding increase in cryptocurrency threats, diverging from past trends. However, cryptostealers have seen a notable increase, caused by the rise of the malware-as-a-service infostealer Lumma Stealer, which targets cryptocurrency wallets.

For more information, check out the ESET Threat Report H2 2023 on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

The Quest for Yeti

Meet the newest rockstar on our squad: Zeti, the runZero Yeti! 🎉 This sub-zero hero is now our official mascot, and we’re excited to give you the lowdown on how Zeti came to be. Why a Yeti, you ask? Keep reading to find out! 

The Trail to Yeti #

We set out on our epic journey to find the perfect mascot for runZero, with a big hairy goal (yeah, we went there) to find an elusive creature who could capture the personality of runZero. We wanted our mascot to reflect who we are as a company, and also provide a glimpse into the quirkiness, nerdiness, and kindness that permeates life in runZero land. We thought about the roots of our name, the mission that lights a fire in us every day, and what makes our product unique and special.

Our name. With a zero built right into our name, we started thinking about all things ‘below zero’ and ‘arctic’ and the creatures that inhabit these spaces. We’re also a remote-first company, and you can’t get much more remote than the places where temperatures are frequently below zero. The Yeti fits right into our arctic landscape and inhabits remote, farflung locations on the planet.

Our mission. runZero helps people find unknown things in their environments, and reveals the mysteries lurking on their networks so they can take action and improve their security. The Yeti has a mystical allure and knack for staying undetected and off the radar (just like all those unmanaged devices and shadowy subnets on your network), mirroring our mission of unveiling the unknown in networks.

Our product. We believe the runZero Platform is rewriting the story of what a CAASM is and should be. And we aim to bust myths left and right — forget the idea that full network visibility is a mythical beast that demands sacrifices like long setups, pricey gear, and annoying credentials. Heck, we’re even cool with you trying it for free without enduring a sales pitch! We’re all about embracing outlandish ideas and flipping the script. So, a Yeti who emerges from the shadows to the light to blaze a new trail? That’s the Yeti we want to hang with.

After some wild brainstorming (with a few detours involving narwhals and penguins), our Yeti was ready to hit the scene. Enter our amazing illustrator.

Bringing Our Yeti to Life #

We (kind of) love you, Generative AI, but this time we decided to tap into human creativity to help us put a face (and a big furry body) on our Yeti. Shoutout to Kennon James, the genius illustrator behind our Yeti’s makeover. Kennon has worked on all sorts of cool illustration projects over the years, including bringing Marvel superheroes to life, illustrating some popular games you know and love, and creating a pantheon of Cthulhu-inspired artwork. The rabbit hole of his Instagram can be found here — and you can thank us later.

With Kennon’s help, we explored Yetis of all shapes and sizes — short Yetis, tall Yetis, Yetis without necks, Yetis with big shoulders, scary Yetis, muppet-like Yetis, goofy Yetis, serious Yetis… you get the picture. And finally we found our match. This Yeti was a cool character, but also friendly, approachable, and ready to lend a big (really big) hand.

And speaking of hands, it took us a few weeks to realize our Yeti only had four fingers. We aren’t sure what happened to the fifth, but luckily with the magic of the marker, our Yeti now has all five digits. ✋ Check it out for yourself:

Giving Our Yeti a Proper Name #

Next up: picking a name for our Yeti. At our team summit in Austin during the Austin City Limits Festival (because why not?) – we unveiled our Yeti and handed out t-shirts worthy of the festival and the Live Music Capital of the World. Then, we challenged the team to brainstorm the perfect name for our new Yeti.

Our creative geniuses proposed names like Seymour, I.C Moore, and Prints. But the chosen one? Zeti. Rhymes with Yeti, memorable as heck, and totally runZero. And all runZero alums? You’re officially Zetis for life!

To jazz things up, we invited Kennon to join the party and illustrate live with creative input from the crew. Check out the artist at work!

This is just the start, folks! Stay tuned for more Zeti adventures—trust us, you won’t want to miss this! 🚀

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

How to ensure remote & hybrid workplace cybersecurity

As the world leans more into remote work and hybrid models, the urgency to maintain security grows. In this environment, security teams face new security risks and must navigate challenges like ensuring secure access and protecting sensitive data. Using personal devices and home Wi-Fi networks at work amplifies these challenges, especially when employees use them.

This article will explore key strategies, focusing on the best countries for remote work, the importance of doubling down on network security, and tips to strengthen your team’s cybersecurity muscle. The content is based on the NordLayer × SoSafe November 29 webinar, available for free viewing for more insights on securing a business.

Best countries for remote work

First off, remote working isn’t a one-size-fits-all; different countries offer varied experiences. At NordLayer, we’ve sifted through 108 countries, assessing them on cyber safety, economic stability, digital and physical infrastructure, and social safety. This analysis has revealed some top picks for remote workers.

5 key insights into remote work destinations

  • Northern Europe is a clear leader in the top 10 for remote work, with Spain (4th) and Portugal (6th) as notable exceptions.

  • Broadly, Europe takes the lead in the top 50, though Montenegro (74th), Bosnia, and Herzegovina (83rd) fall behind.

  • For value-for-money, Portugal (6th) emerges as a standout choice.

  • Interestingly, major English-speaking countries don’t make the top 10, with the USA (16th), Canada (14th), the UK (19th), and Australia (25th) ranking lower.

  • Cyber and social safety are consistent indicators of a good remote work environment.

Cybersecurity plays a crucial role in these rankings. Countries that lead in remote work security, especially in Northern Europe, boast robust cybersecurity infrastructures. This includes top-notch network encryption and secure Wi-Fi networks, essential for remote workers.

Why and how to double down on network security

In 2023, phishing attacks hit hard, accounting for 95% of the causes of all data breaches. This highlights the growing severity of security breaches and data risks in our increasingly digital world.

In this remote and hybrid work era, robust network security is more important than ever. With employees scattered in various locations, a strong, fortified network is key to protecting not just corporate data but the very manner in which we work.

Secure remote access

Begin by securing remote network access. Technologies like VPNs, secure login methods, and access controls are crucial. They create a secure digital boundary, crucial for protecting your operations in a remote work setup. These tools are the first line of defense against potential security risks.

Ensure endpoint security

Securing endpoints—laptops, mobile devices, and home computers—is also vital. Equip these devices with the latest internet security software. This step is essential in safeguarding against unauthorized access and potential security breaches that can originate from vulnerable personal devices.

Invest in employee training and awareness

Finally, employee education is critical. Regular training sessions and cybersecurity drills play a significant role in enhancing your team’s awareness of security risks. By keeping your workforce informed and vigilant, you can significantly reduce the risk of security incidents.

Experts in our webinar underscore the changing nature of cyber threats, with cybercriminals increasingly employing psychological tactics. Thus, continuous monitoring and a robust incident response plan are crucial.

For a deeper understanding of network security and more expert insights, access our detailed webinar. It’s a crucial step in strengthening your remote work environment against the ever-evolving security risks.

Cloud firewalls and Firewall-as-a-Service

Cloud firewalls offer an effective solution for businesses operating in hybrid and remote environments. Take NordLayer’s Cloud Firewall as an instance: it sets rules based on user identity, traffic destination, such as a local server or cloud resource, and access methods, including ports and protocols.

For a deeper understanding of Cloud Firewalls and Firewall-as-a-Service, our free webinar provides comprehensive insights.

Strengthening cybersecurity in teams: taking security threats seriously

The stark reality of security threats

Home-office cyber-attacks in Germany cause over €50 billion in damages annually. This staggering figure highlights the reality and severity of security threats in the modern digital world. Moreover, data security incidents cost, on average, $4.42 million, with remote work adding an extra $1.07 million.

Building a robust cybersecurity culture

Organizations need to further strengthen their security cultures

Despite these risks, only 38% of organizations secure work devices connected to the company network. This gap underscores the need for a stronger cybersecurity culture within teams. Over 90% of IT and cybersecurity experts agree on the importance of awareness, yet 40% of organizations report very low employee awareness levels.

Practical steps to enhance cybersecurity

To address this, businesses must adopt simple, effective cybersecurity practices. Regular software updates, secure access management, and educating employees about phishing and malicious behavior are crucial. Implementing multi-factor authentication can significantly bolster remote work security. Such measures foster resilience and a proactive stance against cyber threats.

Leveraging technology and continuous learning

Adopting behavioral science principles, such as positive reinforcement, can drive secure behavior. Continuous learning and expanding the scope of cybersecurity knowledge are essential for teams. Remember, strong cybersecurity habits benefit both private and work life.

Addressing security gaps in the remote work environment

Tackling security breaches and data breaches

As remote and hybrid work models become more prevalent, data breaches have become a more significant concern. It’s vital to review and update security settings regularly to prevent such incidents. A robust approach to detecting and addressing security gaps, especially in unsecured Wi-Fi networks, is essential for protecting sensitive information.

Secure home Wi-Fi networks

With many employees working remotely, the security of home Wi-Fi networks is more crucial than ever. Encourage employees to strengthen their home network’s security, emphasizing the importance of using secure and unique passwords and staying vigilant against unauthorized access.

3 1400x760

In summary, managing cybersecurity in a hybrid and remote work environment requires a comprehensive approach. Balancing security with usability is key for businesses. Encouraging users to stay aware and use systems and services that protect personal and corporate data is important. It’s essential for organizations to manage their network and devices effectively.

2 1400x700

To learn more about how to manage these challenges and keep your business secure, watch our webinar. It offers practical advice and expert insights to guide you through the complexities of hybrid work and remote work security.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Top 10 cybersecurity trends to watch in 2024

As we navigate through the rapidly evolving landscape of cybersecurity in 2024, it’s crucial to recognize the dynamic nature of cyber threats. Gartner forecasts that worldwide end-user spending on security and risk management will reach $215 billion in 2024, a 14.3% growth from 2023. This investment reflects the increasing complexity of digital risks. 

We explore the top 10 cybersecurity trends, each of them presents unique challenges and requires nuanced responses from cybersecurity professionals.

Key takeaways

  • Global cyber conflicts are escalating rapidly.

  • Data breaches in healthcare are increasing.

  • Remote work brings new security challenges.

  • Human error is the main reason for cybersecurity breaches.

  • Ransomware attacks require better response strategies.

Cyber warfare: an evolving threat in cybersecurity

In 2024, cyber warfare mirrors global tensions, growing in sophistication.

Russian cybercriminals disrupt Ukrainian and European supply chains, impacting aid delivery. A new group, “Cyber Toufan,” believed to be backed by Iran, attacked Israeli companies.

The U.S. grapples with cyber threats from Chinese state-linked threat actors. They have infiltrated about 25 organizations, including U.S. government agencies. Such cyber strikes demonstrate the growing scope of state-sponsored cyber-attacks and emphasize the need for robust cyber defenses.

Impact on the 2024 presidential elections

In the 2024 presidential elections, the shadow of past cyber intrusions looms large. The 2016 election was marred by Russian state-sponsored cyber-attackers who stole and leaked emails from the Democratic National Committee (DNC) and Hillary Clinton’s campaign chairman, John Podesta.

The trend persisted into 2020, when Fancy Bear, the Russian military intelligence-linked unit involved in the 2016 breaches, attempted to gain access to accounts of both Republican and Democratic political consultants, advocacy organizations, and think tanks. Although a specific attack on a Democratic presidential candidate’s advisory firm was thwarted, these incidents signal potential risks for the 2024 elections.

Healthcare sector vulnerabilities

The Health Insurance Portability and Accountability Act (HIPAA), established in 1997, sets strict rules for patient data protection in the healthcare sector. Despite this, healthcare continues to face significant cyber threats.

Recent trends in healthcare cybersecurity show both challenges and progress. The breaches, often due to unauthorized data access, underscore how vulnerable the sector is to cyber-attacks. In 2022, the U.S. healthcare sector saw 344 data breaches. By October 2023, this number decreased to 69 cases, a decline from the peak in 2015.

The consequences of these cyber-attacks are profound. They not only cause financial and reputational damage but also affect patient care. Recent data links ransomware attacks to higher mortality rates and longer hospital stays.

The high cost of health data breaches

From March 2022 to March 2023, the healthcare industry faced the highest costs for data breaches. On average, each breach cost nearly 11 million U.S. dollars. The financial sector ranked second in comparison, averaging 5.9 million U.S. dollars per breach. Across all sectors, the global average data breach cost was 4.45 million U.S. dollars.

Scheme with healthcare sector vulnerabilities in 2023 and 2024

Cybersecurity challenges in the hybrid work environment

In the hybrid work model, several cybersecurity risks are evident. The introduction of various devices and networks expands the potential for cyber threats. Limited control over remote workers and workspaces makes securing devices a challenge. Using public Wi-Fi, especially when traveling, increases exposure to cyber-attacks. Additionally, working across borders can lead to compliance issues with different data privacy laws.

Despite these risks, the shift towards hybrid work persists, making it essential for companies to enhance their cybersecurity strategies to navigate the changing environment.

Generative AI: a new frontier in cyber threats

Generative artificial intelligence, particularly in the form of deepfakes, has emerged as a novel threat in the cyber world.

In August 2023, Mandiant, a cybersecurity firm owned by Google, reported a groundbreaking discovery. They found deepfake video technology being explicitly crafted and marketed for phishing scams. Remarkably, the cost for these deceptive tools was minimal: $20 per minute, $250 for an entire video, or even $200 for a training session.

This development signals a trend in the cybercrime landscape, where advanced artificial intelligence becomes a tool for fraud at surprisingly low prices. This marks a new challenge in cybersecurity.

Supply chain attacks: a growing concern

In June 2023, a North Korean cybercriminal group breached JumpCloud, a SaaS provider, targeting cryptocurrency companies. A report by Chainalysis states that North Korean-linked groups stole about $1.7bn in digital cash through multiple attacks last year.

Supply chain attacks have surged, with a 633% increase in 2022 alone, becoming a prominent part of cybersecurity trends. Factors driving this trend include complex, global supply chains and the sophistication of cyber-attacks.

Picture showing third-party cyber risks

Cloud security and the threat of cloud jacking

Cloud jacking, where attackers hijack cloud accounts, surged in 2023. Cybercriminals exploited cloud vulnerabilities, used phishing or stolen credentials. Once inside, they could steal data, plant malware, or disrupt services. The growing reliance on cloud services widened the potential for such attacks.

Key trends in 2023 included more frequent attacks on SaaS applications and increased automated scanning for cloud weaknesses. Ransomware became a favored tool, locking organizations out of their own cloud data. In 2022, API security lapses contributed to the risks, with a 286% increase in API threats and 34% of organizations without a strategy to protect APIs, leaving 91% of APIs exposed to data theft.

Double and triple extortion

The trend of double and triple extortion in cybercrime has escalated. Techniques combining encryption, data theft, and DDoS attacks are more frequent. Data exfiltration is on the rise, with an increase from 40% in 2019 to 77% in 2022, with 2023 on course to surpass 2022’s total. With this upward trajectory, 2024 is likely to see a continuation of these cyber extortion tactics.

Double and triple extortion image with iconsSocial engineering and user privacy: the human factor

The human element is a significant factor in cybersecurity incidents, with 95% of breaches attributed to human error. This makes it not only a common issue but also a costly and serious one.

In 2023, several major security breaches occurred due to human errors. On January 11, 2023, MailChimp employees fell victim to social engineering by an external party, affecting 133 customers. This incident involved WooCommerce, a widely-used eCommerce plugin for WordPress, leading to the exposure of customer names, store URLs, and email addresses. MailChimp responded by restricting access and informing those affected. They assured that no credit card or password information was compromised. However, the breach highlighted the risk of potential phishing attacks aimed at obtaining credentials or introducing malware.

Picture saying '95% of cyber security incidents are caused by human error'

Ransomware threats: evolution and response

In 2023, ransomware attacks continue to threaten organizations, with attackers demanding payment to decrypt critical data. The impact is growing; U.S. healthcare organizations faced an average downtime of 18.71 days due to these attacks, up from 16 days in 2022. This underscores the evolving nature of cybersecurity trends in ransomware.

The rise of mass ransomware attacks

This year also witnessed a surge in mass ransomware attacks, with ransom-as-a-service groups exploiting software vulnerabilities to target numerous companies simultaneously. Notable incidents include the MOVEit and GoAnywhere software breaches, affecting hundreds of companies. Such widespread cyber-attacks signal a significant challenge for the cybersecurity and insurance sectors, potentially changing the industry’s approach to risk assessment and claims management.

Advancements in Zero Trust security

In the context of current cybersecurity trends, a positive development is also emerging. Zero Trust security, once a strategic goal, is rapidly becoming standard practice. By 2026, it’s expected that 10% of large enterprises will fully implement mature Zero-Trust programs, a significant rise from less than 1% currently.

Implementing Zero Trust is complex, requiring the integration of various components. The key to success lies in demonstrating its business value. Beginning with a simple, scalable approach allows organizations to progressively understand and adopt the framework, managing its complexity step by step.

Strategies for business safety in 2024

  1. Use multi-factor authentication (MFA) to regulate network access.

  2. Add extra authentication factors for administrative accounts.

  3. Assign minimal user privileges in line with Zero Trust principles.

  4. Secure remote devices with VPNs.

  5. Require strong, regularly-changed passwords.

  6. Encrypt all high-value data.

  7. Use data loss prevention (DLP) tools to track valuable data.

  8. Use intrusion detection systems/intrusion prevention systems (IDS/IPS) to track threats in depth.

  9. Back up data regularly.

  10. Audit backups and threat responses to ensure quick disaster recovery.

  11. Regularly test your security systems.

  12. Risk assess core threats and create response plans.

  13. Train all staff to detect phishing attacks.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Channel Program’s 2023 Holidaze is Here

Holidaze – 10 Days of Giveaways and Prizes

Join us in celebrating the holiday season! We’ve partnered with Channel Program as one of the sponsors for their Holidaze giveaway event. 

For 10 business days, from Dec 4th – Dec 15th 2023, you can win prizes like gift cards, travel vouchers, tech gadgets, and more!

Channel Program will draw 2 prizes each day, with 3 grand prizes announced on the final day, December 15th, to help you kick off this holiday season.

Comet is giving away a PlayStation 5 to one lucky winner as one of the Grand Prizes.

Register today to enter the daily prize drawings starting on December 4th!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×