Over Ten Million Ransomware-Related Cyber
Threats Detected
Threats Detected
in Asia Pacific Over the First Five Months of
2016
2016
· More than 500 attacks detected on a daily
basis in Singapore alone
basis in Singapore alone
· 66 million ransomware threats recorded
globally
globally
Singapore, July 12, 2016 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global
leader in security software and solutions, has detected and blocked more than
ten million ransomware-related cyber threats in Asia Pacific (APAC) from
January to May this year, while the total number of similar attacks exceeded 66
million globally. India, Taiwan and Thailand ranked
the top three countries in APAC with the most number of threats; Singapore was
#12 on the list with 82,083 attacks on record so far, translating to close to
550 threats every day.
leader in security software and solutions, has detected and blocked more than
ten million ransomware-related cyber threats in Asia Pacific (APAC) from
January to May this year, while the total number of similar attacks exceeded 66
million globally. India, Taiwan and Thailand ranked
the top three countries in APAC with the most number of threats; Singapore was
#12 on the list with 82,083 attacks on record so far, translating to close to
550 threats every day.
“As Singapore builds the world’s first smart
nation, cybersecurity should become a national imperative ingrained in every
organization’s DNA. It is critical to be aware of the prevailing threats and
ensure that we are equipped with the right defense strategy,” says David Siah,
Country General Manager, Trend Micro Singapore. “Regardless if you are an MNC,
SME, or a government agency, no one is exempted from ransomware attacks; it is
the next biggest threat that is wreaking havoc.”
nation, cybersecurity should become a national imperative ingrained in every
organization’s DNA. It is critical to be aware of the prevailing threats and
ensure that we are equipped with the right defense strategy,” says David Siah,
Country General Manager, Trend Micro Singapore. “Regardless if you are an MNC,
SME, or a government agency, no one is exempted from ransomware attacks; it is
the next biggest threat that is wreaking havoc.”
Trend Micro’s research
shows, globally, 64 percent of ransomware-related attacks come from spam emails
and messages; 34 percent spread via undermined sites, malvertisements, and
landing pages that host exploit kits dispatched by cybercriminals; and the
remaining two percent originate from files.
shows, globally, 64 percent of ransomware-related attacks come from spam emails
and messages; 34 percent spread via undermined sites, malvertisements, and
landing pages that host exploit kits dispatched by cybercriminals; and the
remaining two percent originate from files.
In the first five months of
2016, 50 new ransomware families were added. All of these new families still
encrypt files and drop ransom notes. Many of them have expanded their tactics
by adding sophisticated routines that compel the victims to make payment as
soon as possible. Jigsaw, for instance, threatens to delete an increasing
number of files after every hour of non-payment. Some ransomware families
(TESLA 4.0, a variant of CRYPTXXX, XORBAT, and POWERWARE) are known to
self-destruct after it successfully conducts its routine. This means that
traditional file-based detection will be insufficient to defend the integrity
of data and information.
2016, 50 new ransomware families were added. All of these new families still
encrypt files and drop ransom notes. Many of them have expanded their tactics
by adding sophisticated routines that compel the victims to make payment as
soon as possible. Jigsaw, for instance, threatens to delete an increasing
number of files after every hour of non-payment. Some ransomware families
(TESLA 4.0, a variant of CRYPTXXX, XORBAT, and POWERWARE) are known to
self-destruct after it successfully conducts its routine. This means that
traditional file-based detection will be insufficient to defend the integrity
of data and information.
Singapore is embattled with
several ransomware
several ransomware
In Singapore, several
ransomware families are observed to be extraordinarily active compared to the
others. CryptoLocker, one of the most infamous ransomware, not only locks the
system it infests, but also encrypts certain files found in the hard drive.
Cryptowall 4.0 is known to feature improved communication capabilities and updated
code that allows exploitation of more vulnerabilities than its previous
version. TeslaCrypt targets niche groups of users including gamers, modders,
and Steam users, spreads via spam emails and websites, and exploits a
vulnerability in Adobe Flash Player. Jigsaw, mentioned above, has also been
widely deployed to attack Singapore-based organizations and individuals.
ransomware families are observed to be extraordinarily active compared to the
others. CryptoLocker, one of the most infamous ransomware, not only locks the
system it infests, but also encrypts certain files found in the hard drive.
Cryptowall 4.0 is known to feature improved communication capabilities and updated
code that allows exploitation of more vulnerabilities than its previous
version. TeslaCrypt targets niche groups of users including gamers, modders,
and Steam users, spreads via spam emails and websites, and exploits a
vulnerability in Adobe Flash Player. Jigsaw, mentioned above, has also been
widely deployed to attack Singapore-based organizations and individuals.
“Trend Micro is continually
and actively assessing the ransomware threat landscape so that we can quickly
act in accordance by providing the most targeted and advanced support to our
customers in Singapore.” said
David Siah. “We recommend that organizations start re-evaluating their cyber security strategies and devise a
multi-layered approach against ransomware.”
and actively assessing the ransomware threat landscape so that we can quickly
act in accordance by providing the most targeted and advanced support to our
customers in Singapore.” said
David Siah. “We recommend that organizations start re-evaluating their cyber security strategies and devise a
multi-layered approach against ransomware.”
To help users and organizations fight against
the dangers of ransomware, Trend Micro leverages its threat expertise to
provide self-assessment and free ransomware tools:
the dangers of ransomware, Trend Micro leverages its threat expertise to
provide self-assessment and free ransomware tools:
· Ransomware Readiness Assessment helps businesses of all sizes understand
vulnerabilities in their security posture, and provides concrete actions they
can take.
vulnerabilities in their security posture, and provides concrete actions they
can take.
· Crypto-Ransomware File Decryptor allows systems infected by TeslaCrypt
and CryptXXX to retrieve files that are held hostage by the attackers.
and CryptXXX to retrieve files that are held hostage by the attackers.
· Ransomware Removal Tools helps both consumers and businesses that
have been impacted by ransomware recover their data.
have been impacted by ransomware recover their data.
Notes to editor:
There is a list of ransomware-related
materials developed by Trend Micro, for your easy reference and use.
materials developed by Trend Micro, for your easy reference and use.
· Ransomware 101: What
organizations need to know
organizations need to know
· Infographic: Ransomware
by the Numbers
by the Numbers
· Infographic: Ransomware
Rescue Plan
Rescue Plan
About Trend Micro
Trend Micro Incorporated, a global leader in cyber
security solutions, helps to make the world safe for exchanging digital
information. Our innovative solutions for consumers, businesses, and
governments provide layered security for data centers, cloud environments,
networks, and endpoints.
security solutions, helps to make the world safe for exchanging digital
information. Our innovative solutions for consumers, businesses, and
governments provide layered security for data centers, cloud environments,
networks, and endpoints.
With over 5,000 employees in over 50 countries
and the world’s most advanced global threat intelligence, Trend Micro enables
organizations to secure their journey to the cloud. For more information,
visit www.trendmicro.com.
and the world’s most advanced global threat intelligence, Trend Micro enables
organizations to secure their journey to the cloud. For more information,
visit www.trendmicro.com.
For the LATEST tech updates,
FOLLOW us on our Twitter
LIKE us on our FaceBook
SUBSCRIBE to us on our YouTube Channel!