Skip to content

The Cybercrime Season

As the festive lights begin to twinkle and the holiday season approaches, there is a not-so-jolly phenomenon lurking in the digital shadows: the annual boom in cybercrime. The 2022 holiday season witnessed an alarming 550% increase in unique threats, painting a concerning picture of the cyber threatscape.  Cybercriminals around the world are capitalizing on the holiday rush, leaving a trail of financial losses, fraud and compromised cybersecurity in their wake.

Counting the Cost

The financial loss from cybercrime during the holidays is staggering. In the UK alone, shoppers lost a jaw-dropping £10.6 million ($13 million) during the 2022 festive season. Norton’s 2022 findings reveal that about one in three adults (34%) in the U.S. are taking more risks with online shopping as the holidays draw near, echoing a global trend where 32% of adults admit that they are more lax about online security during the festive season.

Why Cyber Attacks Surge During the Holiday Season

Festive Mood: The holiday season brings a range of emotions, from joy to stress. People may be more susceptible to cyber threats when they are distracted or emotionally charged, making them an easy target for phishing attacks.

Holiday Shopping Season: The holiday season sees a significant increase in online shopping as people search for the perfect gifts. Cybercriminals are capitalizing on this surge using tactics such as creating fake online stores, phishing emails, and malicious links.

Travels & Public Networks: With many people traveling during the holidays, the use of unsecured networks and devices has become prevalent. Cybercriminals exploit vulnerabilities in public Wi-Fi, compromising the security of those transmitting sensitive information while on the go.

Holiday Edition Scams: Scammers, hackers, and criminals are taking advantage of the goodwill surrounding the holidays by launching fake charity websites or gift cards and fraudulent travel offers to exploit people’s generosity and trust.

Social Media Sharing: Holiday travels or family celebrations are often shared on social media. Cybercriminals may use this information to craft targeted attacks, such as phishing attempts or account takeover schemes.

Most Common Types of Holiday Season Attacks


Phishing:

Cybercriminals are sending deceptive emails, messages, ads or links designed to look like holiday communications, impersonating legitimate entities to trick users into disclosing sensitive information.

Ransomware:

Companies face increased vulnerability to ransomware attacks during the holiday season. The need to maintain uninterrupted operations and secure them during the busy season often makes companies more willing to pay the ransom as the potential loss of valuable data and the risk of operational disruptions become increasingly untenable.

DDoS Attacks:

Distributed Denial of Service attacks surge, targeting sites, organizations and online services to overwhelm them and disrupt their normal functioning. This leads to frustration among both employees and customers and causes a significant impact on both revenue and productivity.

Account Takeover (ATO):

During the holiday season, many factors cause people to pay less attention to their digital hygiene. This helps cybercriminals gain unauthorized access to user accounts by exploiting compromised credentials for various malicious activities.

 

Recommendations to Reduce Cybercrime Risks

  • Stick to well-known and reputable online retailers to minimize the risk of consumers falling victim to fake websites.
  • Enable two-factor authentication (2FA) whenever possible to protect your accounts from unauthorized access.
  • Regularly update antivirus and security software to stay protected against the latest threats.
  • Avoid entering sensitive information anywhere when using public Wi-Fi, especially when traveling.
  • Before making donations or taking advantage of holiday deals, verify the legitimacy of the company on the websites and offers to prevent falling for scams.
  • Proactively safeguard yourself against malicious websites, phishing attempts, and harmful content using web filtering that blocks access to dangerous resources and provides one more layer of security.
  • Educate yourself and stay informed about common cyber threats and scams to recognize and avoid potential risks.

By understanding the reasons behind the increase in cyber attacks, recognizing specific threats, and implementing recommended security measures, you can protect yourselves from the Grinches of the cyber world.

Let’s celebrate the holidays with joy, warmth, and a commitment to protecting ourselves and our digital cheer.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

MSPs putting a stop to “hide and seek” within their environments with ESET Cloud Office Security

Amidst increased obfuscation of multistage malware attacks, MSPs need an effective way to secure cloud communication while avoiding the need for multiple unique network connection authorizations.

The days of simple and easily detectable malware are long gone. Recent campaigns by both OilRig and MuddyWater advanced persistent threat (APT) groups show that threat actors are constantly seeking new ways to hide their multistage malware attacks among files of commonly used cloud services. 

This presents a dilemma for managed service providers (MSPs) that rely heavily on cloud-based solutions. But how should MSPs defend against increasingly sophisticated attacks without the burden of trying to control every single stream of communication within the MSP environment?

A growing market and a growing threat

With the never-ending hunger for cloud-managed services, it is no surprise that the MSP market is constantly expanding, and business reports, such as MarketsandMarkets, expect further growth by around $100 billion U.S. dollars within the next five years.

Both MSPs and other outsourced business practices have proven to be the answer for countless companies seeking high-end solutions for reasonable prices. But there are two sides to every coin. Professional communications, services, and shared files all moving to the cloud has created a new breeding ground for sophisticated malware.

Threat actors deploying this malware are often profit-driven and/or state-sponsored APT groups using command-and-control (C&C) servers to communicate with compromised devices over targeted networks. When successful, these servers can issue commands to steal or encrypt data, spread malware, disrupt web services, and more.

To enable this approach, APT groups need to establish persistence within the targeted businesses, obfuscating malicious files and processes among legitimate ones.

A draft email you’ll never send … nor ever even wrote

ESET researchers have described recent attacks in detail while following the evolution of campaigns run by the OilRig group.

To avoid cybersecurity scanning tools, OilRig has not been deploying fully fledged malware but, instead, has scaled its attacks. While the initial attack vector of the recent campaigns remains unknown, presumably it was a phishing email. This email would contain a downloader that wouldn’t cause any specific damage but, as the name implies, is designed to secretly download additional malware from the internet. Several versions of these downloaders have been documented by ESET researchers.

Studying these downloaders, it is clear that OilRig is keenly focused on identifying new ways to obfuscate malware deployment using legitimate cloud service providers for C&C communication.

The first in the series, SC5k downloader, uses the a shared Microsoft Exchange email account and Microsoft Office Exchange Web Services API for C&C communication. Within this email account, the attackers create draft messages with hidden commands. Once the downloader infests a device, it will log in to the same account to receive both the commands and the payloads to execute. Its successor, OilCheck, works similarly but uses the Outlook mail API in Microsoft Graph. 

New versions of OilRig downloaders, ODAgent and OilBooster, communicate using the Microsoft Graph OneDrive API. They access a OneDrive account controlled by the attackers for C&C communication and exfiltration.

The evolution of malware-hiding capabilities was also recently noted in the case of another APT group linked to Iran called MuddyWater

In a separate MuddyWater campaign, described by DeepInstinct, the APT group reused previously known remote administration tools and hid them in the cloud-based content management system (CMS), called Storyblok, to host archives with compromised files.

ESET to help deal with the dilemma

The hiding capabilities of present-day C&C attacks have pushed businesses toward higher control over their network traffic. From standard network monitoring, it can go as far as individually authorizing any network connection.

However, the higher the control, the higher the workload on MSP admins and technicians who are already drained from a never-ending stream of alerts. So what do businesses choose: strict control that comes with alert fatigue or lower security standards that can result in a data breach?

With its MSP Program, ESET can help businesses deal with this dilemma. The program is based on the ESET PROTECT solution, which provides multilayered protection, and its higher tiers also integrate ESET Cloud Office Security (ECOS), which is designed to protect Microsoft 365 and Google Workspace applications.

ECOS — effectiveness in numbers*

  • 750,000 email threats detected
  • 360,000 phishing emails blocked
  • 21 million spam emails captured

*7-month period in 2023

In fact, these ESET security solutions can disrupt the described C&C processes at several stages, which means that companies don’t have to focus on network control as much.

Anti-phishing protection

Though the initial attack vectors of OilRig and MuddyWater campaigns are unknown, both APT groups have successfully kicked off their campaigns with phishing emails in the past. ECOS prevents users from accessing web pages known for phishing once they click on the phishing link in the email.

Antimalware protection

ESET’s defense against malware eliminates all types of threats. Moreover, ECOS scans all new and changed files in OneDrive, Google Drive, Microsoft Teams, and SharePoint Online.

ESET LiveGuard Advanced

If ESET malware detection engines detect a never-before-seen type of threat, they pass the file to the ESET cloud-based sandboxing tool ESET LiveGuard Advanced for further assessment.

Multi-tenant

ECOS multi-tenant functionality allows you to protect and manage multiple Microsoft 365 and Google Workspace tenants from one ESET Cloud Office Security console.

Conclusion

The growth of cloud-based business practices has ushered in cloud-based cyberattack tactics that MSPs need to deal with. And the results can be dire. With their privileged access to business networks, compromised MSPs can also be dangerous for their clients by triggering a supply chain attack.

The good news is that you don’t need to face those threats alone. Since its foundation in 1992, ESET has developed a robust multilayered defense system capable of stopping C&C attacks at different stages and much more. ESET solutions are also available for MSPs as a part of the ESET MSP Program. Don’t be the weak link in supplier relationships. Be the strongest. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

How Cloud-Based PKI is Transforming Network Authentication & Security

The need for robust and scalable security solutions is more pressing than ever thanks in large part to the emergence of increasingly sophisticated cyber threats. Amidst this backdrop, cloud-based public key infrastructure (PKI) emerges as a beacon of reliability and efficiency. This article delves into the advantages of leveraging cloud-based PKI for network authentication and security, a topic that resonates with the ongoing transformation in cybersecurity practices.

Cloud-based PKI refers to the deployment of public key infrastructure, a framework for managing digital certificates and public-key encryption, through cloud services. Unlike traditional on-premises PKI solutions, cloud-based PKI offers a blend of flexibility, scalability, and cost-effectiveness, making it increasingly popular among businesses and organizations. 

Scalability and Flexibility

One of the paramount benefits of cloud-based PKI is its scalability. As organizations grow, their security needs evolve, necessitating a system that can seamlessly scale up or down. Cloud-based PKI platforms can easily accommodate changes in certificate volume or demand, without the need for extensive physical infrastructure. This scalability extends to the flexibility of managing digital certificates, allowing organizations to swiftly adapt to new security challenges.

Cost-Effectiveness

Transitioning to cloud-based public key infrastructure also translates to significant cost savings. Traditional PKI solutions often require substantial upfront investment in hardware, software, and specialized personnel. Cloud-based PKI, on the other hand, operates on a subscription-based model, which reduces capital expenditure and turns it into an operational cost. This shift not only makes PKI more accessible to a broader range of organizations but also allows for better budgeting and resource allocation.

Enhanced Security

Cloud-based PKI solutions come with the added advantage of enhanced security. Cloud providers typically employ advanced security measures, including regular updates and patches, to protect the infrastructure against emerging threats. This level of security is often more comprehensive and up-to-date than what individual organizations can achieve on their own.

Simplified Management and Compliance

Managing a PKI environment can be complex, especially when it comes to compliance with industry standards and regulations. Cloud-based PKI simplifies this process by offering tools and frameworks that streamline certificate management. Automated workflows, easy-to-use interfaces, and compliance-ready configurations reduce the administrative burden and minimize the risk of human error.

Accessibility and Disaster Recovery

The cloud-based nature of these PKI solutions ensures high availability and accessibility. Users can manage certificates and access the system from anywhere, fostering remote working and global operations. Moreover, cloud providers often have robust disaster recovery and backup strategies, ensuring continuity and security of the PKI system even in the event of physical disasters or data center outages.

Rapid Deployment and Integration

Deploying a cloud-based public key infrastructure solution is typically quicker and less complex than setting up an in-house system. Cloud providers offer pre-configured environments that can be rapidly integrated with existing IT infrastructure. This speed of deployment is crucial for organizations needing to quickly adapt to changing security requirements.

Future-Proofing with Cloud-Based PKI

As technology continues to advance, cloud-based public key infrastructure offers a pathway to future-proofing security infrastructure. Cloud providers consistently update their services to incorporate the latest security technologies and protocols, ensuring that organizations are not left behind in the evolving digital landscape.

Challenges and Considerations

While cloud-based public key infrastructure offers numerous benefits, organizations must also consider potential challenges. These include ensuring data privacy, understanding the shared responsibility model of cloud security, and choosing the right cloud provider that aligns with their specific needs and compliance requirements.

Embracing the Cloud for Enhanced Security

In conclusion, cloud-based PKI stands as a pivotal solution for contemporary network authentication and security challenges. Its scalability, cost-effectiveness, enhanced security, and ease of management make it an attractive option for organizations looking to bolster their digital defenses. As businesses navigate the complexities of cybersecurity, cloud-based public key infrastructure offers a pathway to a more secure, flexible, and efficient digital future.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

The future of Zero Trust: key cybersecurity trends in 2024 and beyond

Zero trust architecture has rapidly become a cornerstone of modern cybersecurity, and as we move into 2024, its implications for businesses are becoming increasingly profound.

Ready to start 2024 off securely? Try Parallels Secure Workspace for free now. 

Here’s a look at what zero trust might look like for businesses in 2024.

Adoption of Zero Trust via Remote Browser Isolation (RBI)

One of the more innovative trends in zero trust architecture by 2024 could be the widespread adoption of remote browser isolation (RBI).

As web browsers remain a primary vector for cyber-attacks, businesses are likely to embrace RBI as a means to implement zero trust principles directly at the point of web access.

RBI technology isolates the browsing activity from the end user’s device and the company’s network, instead running it in a secure, remote environment. This means that any malicious content encountered during browsing is contained within this isolated environment and cannot reach the user’s device or the corporate network.

The adoption of RBI would signify a proactive step towards minimizing the surface area of attacks, particularly for businesses with a large remote workforce.

By integrating RBI within their Zero Trust framework in 2024, companies will not only secure their networks but also provide a safer, seamless web experience for their users, further reinforcing their overall cybersecurity posture in a landscape where web-based threats continue to evolve rapidly.

The remote browser isolation market is expected to witness a growth rate of over 40% between 2020 and 2026 (Global Market Insights, 2021).

This statistic suggests a growing recognition of RBI’s role in enhancing zero trust architectures, particularly in mitigating web-based threats.

Embracing a “never trust, always verify” philosophy

Zero Trust is founded on the principle of “never trust, always verify.”

In 2024, businesses will increasingly adopt this mindset, moving away from the traditional perimeter-based security models. This shift means that no user or device, whether inside or outside the network, is automatically trusted. Instead, each request for access is thoroughly vetted.

It’s projected that over 60% of enterprises will phase out their traditional VPNs in favor of zero trust network access, emphasizing the “never trust, always verify” principle (Gartner, 2022). This shift is driven by a growing understanding that perimeter-based security is no longer sufficient in the face of sophisticated cyber threats.

Enhanced identity and access management (IAM)

Identity and access management will become more sophisticated in 2024.

Multi-factor authentication (MFA) will be the norm, not the exception, and businesses will employ more advanced methods like biometrics and behavioral analytics to verify identities. This enhanced IAM will be crucial in managing access to resources and ensuring that only authorized individuals can access sensitive data.

The IAM market is expected to grow from $12.3 billion in 2020 to $24.1 billion by 2025, at a compound annual growth rate or CAGR of 14.4% (Markets and Markets, 2021). This growth underscores the increasing adoption of advanced IAM solutions like biometrics and behavioral analytics in zero trust architectures.

Micro-segmentation of networks

Businesses in 2024 will increasingly use micro-segmentation to split their networks into smaller, isolated zones. This approach limits lateral movement within the network, making it harder for attackers to access sensitive data, even if they penetrate the network’s outer defenses.

A study shows that micro-segmentation can reduce the cost of a data breach by up to 50% (Ponemon Institute, 2021). This statistic highlights the growing importance of micro-segmentation in enterprise security strategies, particularly in the context of zero trust.

AI and machine learning integration

Artificial intelligence and machine learning will play a significant role in zero trust frameworks by 2024. These technologies will help in continuously analyzing network patterns and user behavior to detect anomalies that might indicate a security threat, enabling quicker and more effective responses to potential breaches.

According to IDC, worldwide spending on AI is expected to pass $300 billion by 2026, with a significant portion of this investment aimed at enhancing cybersecurity (IDC, 2022).

This investment reflects the pivotal role AI and machine learning are playing in the evolution of zero trust security models.

Cloud security posture management (CSPM)

With businesses increasingly relying on cloud services, Cloud Security Posture Management will become an integral part of zero trust strategies.

CSPM tools will help businesses continuously monitor and manage their cloud security posture, ensuring compliance and reducing the risk of misconfigurations and other common cloud-based vulnerabilities.

Gartner predicts that by 2027, 80% of vendors will offer cloud security posture management or CSPM as a feature of their cloud security platforms, as compared with 50% in 2022.

This trend is a clear indicator of the increasing relevance of CSPM in zero trust strategies, especially as businesses continue to migrate to cloud environments.

Comprehensive endpoint security

Endpoint security will evolve to be more comprehensive in 2024. Businesses will adopt advanced endpoint detection and response (EDR) solutions that not only protect against known threats but also use behavioral analysis to detect unknown threats. This is especially important as the workforce becomes more mobile and remote.

The endpoint security market is forecasted to grow from $12.8 billion in 2019 to $18.4 billion by 2024, at a CAGR of 7.4% (Markets and Markets, 2020). This growth is a testament to the rising need for advanced endpoint security solutions, including EDR, in the context of zero trust.

Regulatory compliance and Zero Trust

As zero trust becomes more mainstream, it will likely be intertwined with regulatory compliance. In 2024, we might see regulations that specifically require certain zero trust measures, particularly in industries handling sensitive data like finance and healthcare.

A survey by Deloitte revealed that 47% of organizations see aligning cybersecurity with regulatory requirements as a top driver for cybersecurity strategy (Deloitte, 2023). As Zero Trust models become more mainstream, their integration with regulatory compliance is likely to become more pronounced.

Education and training

Finally, the human element will remain a critical component of zero trust in 2024. Businesses will invest more in educating their employees about cybersecurity best practices. Regular training and awareness programs will be key in preventing social engineering attacks and ensuring that employees understand their role in maintaining the security posture.

A report by Cybersecurity Ventures predicts that global spending on cybersecurity awareness training for employees is poised to reach $10 billion annually by 2027, up from around $1 billion in 2014 (Cybersecurity Ventures, 2023). This significant increase underscores the crucial role of human factors in the success of zero trust strategies.

The state of Zero Trust in 2024

In conclusion, in 2024 Zero Trust security will be a comprehensive, dynamic approach to security, integrating advanced technology, strict access controls, and ongoing education to protect against the ever-evolving threat landscape.

For businesses, this means a more resilient, proactive stance against cyber threats, protecting their data, reputation, and ultimately, their bottom line.

Each of these data points and predictions is rooted in current trends and expert analyses, providing a credible glimpse into what zero trust might look like for businesses in 2024 — and beyond.

Ready to start or continue your Zero Trust journey? Get your free trial of Parallels Secure Workspace now and start 2024 off on the right foot.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

Wishing You a Joyous Season and a Prosperous New Year!

As we wrap up another incredible year, we want to take a moment to express sincere gratitude to all our сustomers and followers. Your trust and support have been the driving force behind our success, and for that, we are truly thankful. 

May 2024 be a year of growth, success, and new opportunities for you and your loved ones.

At SafeDNS, we are committed to continuing our journey of innovation and excellence, providing you with cutting-edge cybersecurity solutions to keep you safe in the digital world. Your safety and security are our top priorities, and we look forward to serving you with even greater dedication in the coming year.

Thank you for being an integral part of the SafeDNS family. We wish you a Merry Christmas, a Happy New Year, and a holiday season filled with love, laughter, and cherished memories.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×