Saudi Arabia’s first and the UAE third in terms of number of actors and individuals is a thief of Crypto-currencies in the Middle East and Africa

The gate Arab news technical

Witness the hacking of the electronic development of new and fast is the high incidence of instrument of Crypto-currencies illegal across devices, users of the internet towards the compounding rates of profit and the proceeds of a pirate, while experiencing software ransomware e-magal in price and momentum is a disturbing, depending on the version the 23 for the announced by the company Symantec today entitled “report of the security threats on the internet”, and the process of instrument of Crypto-currencies illegal where is penetrating users ‘ computers with the aim of instrument currency is encrypted.

Said hussam sidani, Regional Director for Symantec in the Gulf region: “the operations are an instrument of Crypto-currencies are a growing threat to the Internet Security of the personal data of users, presents a challenge to reap enormous profits data users and devices and institutions to threats by the hackers instrument of Crypto-currencies who succeed in penetrating operating systems, and all match their hands of devices and personal computers and giant”.

Data for the United Arab Emirates within the “report of online security threats to 2017” to improve the level of data security compared to the levels of the world, where the dropped state of the center 52 in 2016 to 51 through 2017 in terms of threats to the security of the data, but the UAE in turn jumped this year ranked 10 in the Middle East and Africa to reach the centre of the 9 According to the report.

Based on the report of the threats to the regional for the year 2017 on eight metrics constitute the main sources of threats are:

  • Malware.
  • Software development.
  • Software design electronic.
  • Malware automated “bots”.
  • Network attacks.
  • Attacks the internet.
  • Software ransomware.
  • Pirates of instrument of Crypto-currencies.

During the past year, focused attacks in the UAE is mainly from the Pirates of instrument currency software ransomware and malware.

The “report of online security threats” from Symantec Corporation comprehensive view on the threat landscape, which provides Analytics and data on the activity of global threats and trends, the motives of Internet hackers to carry out these activities.

As this report is based on analyses of data provided by the Symantec global intelligence, which is the largest network to collect data threats to the civilian world, where the relay network of more than 700 thousand cases a global threat and the case of penetration by shouted 126.5 million units sensor products around the world, and the Network Monitor these activities in more than 157 countries and regions, and highlighted the results that the monitoring report include the following:

The high incidence of instrument of Crypto-currencies via the users ‘ computers at a rate of 8500 percent

The past year has seen a tremendous rise in the value of the currency encrypted, which speed the pace of operations and the instrument for this work heavily with attempts to Internet hackers to get money in the market is witnessing significant changes, therefore, the increased operations of instrument of Crypto-currencies across the computers of the users at the rate of 8,500 percent in 2017.

In the Middle East and Africa, acquired the operations of instrument of Crypto-currencies of the UAE to the second place in terms of the highest number of individuals and a thief of Crypto-currencies, by the kingdom of Saudi Arabia in the first place, according to the report.

Globally, it was the United States of America the lion’s share as the largest market in terms of rates the processes of instrument of Crypto-currencies through 2017, “24.47 percent”, followed by Japan and Germany in the global ranking.

In light of the ease of operations of instrument of Crypto-currencies, which require two lines of codes of programming for the success of the operation, says Pirates of the Internet to harness the organs of the victims and the use of the processors of the central cloud of individuals and institutions to preserve this work.

Lead the process of instrument currency as such to a slowdown in the performance of the catalyst and high temperature of the battery, and in some cases stop the device from working, and the need for enterprise systems many dangers as a result of these processes, the in-stop devices for work, high frequency of consumption of CPUs, cloud, and thus incur high costs.

Added sidani: “now you may individuals face significant challenges in protecting the resources on their phone or their computer or any device working via the technology of the Internet of things, where a hacker uses to them, this situation is explained on the users expansion of the means of Defence, otherwise they will find themselves talking cost of driving other people to drive on their servers and use their resources”.

This comes at a time that is still devices working on networks and Internet of things constitute the targets of Internet hackers, it has clarified a report by Symantec to 2017 has increased at a rate of 600 percent in the number of attacks on devices the Internet of things, means that cybercriminals took advantage of the nature of the connection of these devices and they said the instrument of the coins in large numbers.

Most criminal networks use one methodology to attack the victim.

Witness the number of groups of criminals the internet is growing impressively, according to the interests of Symantec, which monitors 140 range, in the past year, the percentage of targeted attacks that began trick design e-71 percent, which is considered the oldest tricks registered.

While facing these groups rely on techniques and attempts, successful and proven to penetrate computer systems, the attacks and the immediate experiencing decline, showed a report by Symantec that there is a proportion of 27 percent of these groups proved impenetrable for the immediate in the past.

Long discussions took place between experts in the field of information security about the nature of the harm that can be unleashed by such attacks in the internet today, the experts go beyond the theoretical aspect, in this regard, it turns out that one group of ten groups used malicious software to sabotage.

For example, the FBI has issued us a warning last week stating that hackers have already infiltrated the systems of Vitality within the United States, including energy networks, with the possibility that these shops may have been destroyed, and in this region, know factory to reprocess in Saudi Arabia of cyber attacks in August 2017 targeted destruction of the systems run the business, and that it was intended to cause an explosion.

Take Profit is the first objective software ransomware

In 2016, led the profit through software ransomware to the occurrence of momentum in the market this type of software, and in 2017, the market experienced a correction, where the average cost of such software to 522 USD, reflecting the turning nature into a kind of peace.

Maybe shift the focus a lot from the Pirates of the internet into an instrument of Crypto-currencies as an alternative to achieve wealth, especially that the value of these currencies on the increase, in addition, in a time of declining categories software ransomware, the number of variables increased by 46 percent, suggesting that hacker groups no longer have the only tricks innovative limited but it is still more productive.

The UAE ranked sixth among the States most targeted by software ransomware in the Middle East and Africa last year, fell 4 times from the year 2016. Topped Saudi Arabia’s ranking again in the Middle East and Africa in terms of the number of software ransom, and at the global level, the UAE came in ranked 41st at the rate of 0.30 percent of the software ransomware which has been monitored globally, came to Saudi Arabia in the centre to 25, increased by 0.61 percent of the cases that have been monitored globally.

200 percent growth rate of malware in the systems of the supply chain

Spotted by Symantec, an increase of 200 percent in terms of malware attacks stationed in the systems of the supply chain through 2017, equivalent to the onslaught of one each month, compared to four attacks during the previous year.

And updates issued by software hackers infiltrated the Internet to find a gap to break into secured networks, and a prominent example, was the spread of the virus “house” which is delivered to the accounts of the special one of the supply chains in Ukraine, through the use of multiple methods to spread along the network.

Showed a report by Symantec, that the electronic message is at least one, for each 238 message received by users at institutions within the UAE have been hacked by a malware, a rate far higher than the world average of a message every 412 electronic message.

For large enterprises, “outstanding staff of more than 2,501 employees” has been the messages of electronic malicious, in the sense of a message for each 76 email containing malicious attachments or a link to a devastating, and for the sectors most affected included construction, transportation and public utilities and services.

Malware custom to penetrate mobile devices continues to grow

Facing threats to your mobile devices increased year on year, including the increase in the number of variants of malicious software at a rate of 54 percent, have been successful monitoring systems, a subsidiary of Symantec in blocking average of 24 a malicious application exists for mobile devices every day in the past year.

While there is still a lot of users rely on legacy operating systems, it would exacerbate this problem, for example, the percentage of users of the latest version of the Android system with only 20 percent, while the proportion of users of the systems updated last about 2.3 percent.

Saudi Arabia’s first and the UAE third in terms of number of actors and individuals is a thief of Crypto-currencies in the Middle East and Africa

Leave a Reply

Your email address will not be published. Required fields are marked *