IT Brief Asia logo
Technology news for Asia's largest enterprises
Story image

Top cyber threats for Australia in 2020

FYI, this story is more than a year old

COVID-19 scams, ransomware attacks, mobile adware and fleeceware, stalkerware and deepfakes were the top cyber threats that impacted Australian and global businesses in 2020.

This is according to new findings from Avast, the digital security and privacy products provider.

Ransomware

According to Avast, ransomware grew by 10% in Australia and 20% globally during the height of the pandemic in March and April, in comparison to January and February this year.

Some major Australian companies that unfortunately experienced ransomware attacks this year included, Australian aged-care provider Regis Healthcare, Australian transportation and logistics firm Toll Group, Australian beverage giant Lion, and Australian media monitoring company Isentia, among others.

Phishing

Aside from ransomware attacks on businesses, phishing attacks were very widespread this year, Avast states.

While COVID-19 related phishing attacks surged in March, with 7.9% of phishing scams using themes related to the virus in that month, the impact on overall phishing numbers was small, with Avast's data showing that less than 1% of global and Australian phishing attacks used COVID-19 as a theme throughout the year.

Australians also experienced an increase in Government impersonation phishing scams around tax and superannuation, and online shopping and package delivery phishing scams targeting people doing their Christmas shopping, Avast states.

Spyware and stalkerware

The Avast Threat Labs discovered a 51% increase in spyware and stalkerware globally from March through June, in comparison to the first two months of the year.

Across the year, Avast detected over 647,000 spyware and stalkerware attacks globally and over 6,200 in Australia.

Adware

However, out of all Android threats Avast detected in 2020, adware was the dominant malware globally, with a share of nearly 50% in Q1, over 27% in Q2 and 29% in Q3.

In Australia, over 18,500 users were attacked by adware on mobile this year, with Avast seeing peaks in February, April and May.

Deepfakes

More deepfakes also appeared in 2020, including explicit deepfakes of TikTok users.

In a talk at Avast's Cybersec - AI, Connected virtual conference Professor Hany Farid of UC Berkeley noted that technology is evolving quickly, making it easier and easier for video and audio deepfakes to be created, and the rate at which deepfakes can spread is also increasing due to social media, creating challenges for security researchers around detecting them.

Cybercriminals in 2020

Avast security evangelist Luis Corrons says, “The past year has been defined by the COVID-19 virus affecting the entire world, including the cyberworld.

“Avast observed cybercriminals use the pandemic to their advantage, spreading scams and attacks to exploit people's weaknesses during trying times. Ransomware attacks, in particular, continued to thrive this year, pitilessly attacking medical institutions with ransomware, like Maze.

Corrons says, “With millions of workers around the world and in Australia using Remote Desktop Protocol (RDP) daily to remotely access their business network, this tool also became a strong cyber attack vector in 2020 and Avast monitored a rise in attacks specifically designed to exploit RDP in order to execute widespread ransomware attacks.

“Certain types of threats, including stalkerware, which is a growing category of malware with disturbing and dangerous implications, and adware, also flourished due to people being forced into lockdown and likely spending more time on their mobile devices.

He says, “What's alarming is that cybercriminals began to promote mobile adware and fleeceware more heavily to younger audiences via popular social platforms like YouTube, TikTok, and Instagram this year, just like regular marketers would, to increase the number of app downloads.

Corrons says, “Looking back, the pandemic did not slow down cybercriminals, instead they seized the opportunity of people spending more time online to adapt old tricks to spread various types of fakes, scams, and to target major businesses with ransomware.

"While technology today is a great resource for us all to stay connected and keep up communications and work, people need to stay extra conscious and cautious about what they see online and verify things they come across before trusting news, apps, links, sales offers, and even video content, as they could be manipulated.

Related stories
Top stories
Story image
Hybrid Cloud
Hybrid cloud security driving need for deep observability
Gigamon is bringing application and network-level intelligence together to help network, security, and cloud IT operations teams eliminate security blind spots.
Story image
Software-as-a-Service
BigCommerce announces launch on Google Cloud Marketplace
The move makes it easier for global enterprise customers to modernise their ecommerce platform to expand audience reach and drive business growth.
Story image
Network Management
Data is growing at breakneck speed, but are we optimising its value?
Data lies at the heart of digital transformation, as every digital touchpoint translates to a data point. In this digital-first world, data is being created everywhere today – at breakneck speeds.
Story image
DevOps
Disparate data causing headaches for A/NZ businesses
Gone are the days when developers could get away with merely producing code. Many are now expected to be accountable for their code, which should be ‘clean’, right up to deployment.
Story image
Cashflow
Exclusive: Corpay plans to provide more hedging features
Corpay addresses border payments and currency risk management. Offering hedging, payment technology, cash flow solutions and exotic currency capabilities
Story image
Data management
Talend Data Health Barometer reveals ability to manage data is worsening
Most respondents believe data is important, 97% face challenges in using it effectively, and nearly half say it’s not easy to use data to drive business impact
Story image
Artificial Intelligence
ASUS Servers announce AI developments at NVIDIA GTC
The Taiwanese multinational now offers NVIDIA-certified servers with H100 Tensor Core GPU and AI enterprise software suite.
Story image
Internet of Things
Absolute’s Persistence tech in Insyde’s Snapdragon platforms
Insyde extends Absolute’s secure device management and self-healing endpoint capabilities to a broader range of enterprise-ready devices.
Story image
Digital Transformation
Kyndryl announces Kyndryl Bridge to drive business growth
Kyndryl Bridge uses operational data patterns and IP to improve and accelerate its AI-powered analytics and business objectives
Story image
Data Centre Cooling
The world is heating up, but data centres should keep their cool
With the world heating up, the challenge of keeping data centres cool becomes more complex, expensive and power intensive.
Story image
Cybersecurity
Video: 10 Minute IT Jams - An update from SearchInform
Val Novoselova joins us today to to discuss new trends in the information security space, and how SearchInform is adapting to some of the new trends we are seeing.
Story image
Software-as-a-Service
Micro Focus HCMX wins honours in cloud management reports
HCMX was also ranked as a market leader among all the participating vendors in the Hybrid Cloud Discovery and Mapping Solutions Tool, 2022.
Story image
No-code
Eradicating ‘App Fatigue’ and retention problems through implementing no-code ITSM
Almost always, simplicity is best. Intuitive designs and practical workflows are the keys to preventing fatigue.
Story image
Malware
SonicWall threat report mid-year update highlights significant threat variance
The 2022 SonicWall Cyber Threat Report mid-year update from SonicWall gives an in-depth insight into many of the current trends across the threat landscape.
Story image
Digital Transformation
Huawei reveals next steps for cloud network innovation
Huawei unveiled the upgrades of its Intelligent Cloud-Network Solution and its Wireless Intelligent Network Architecture whitepaper at the recent Huawei event.
AWS Marketplace
Whitepaper: A practical guide for mitigating risk in today’s modern applications
Link image
Story image
IT Training
Six ways to transform your cybersecurity training and influence lasting change
If the goal is to win hearts and minds, formal awareness training can fall short and often doesn’t inspire people to care.
Story image
Digital Transformation
Ensono delivers cloud economics with engineering resources
The new service offers access to global cloud engineering and DevSecOps experts focused on accelerating digital transformation.
Story image
Cybersecurity
Employees unsure who to go to to report security incident
A new study shows more than 20% of the untrained global workforce do not know who to contact during a security breach.
Aws Marketplace
Learn how to implement a backup and recovery plan for a new generation of Kubernetes-based modern applications
Link image
Story image
Digital Transformation
Smartsheet reveals new product innovations during Engage
New features on data visibility, project control and third-party solution integration are in store for local Smartsheet customers.
Story image
Business Intelligence
IDC finds the majority of executives expecting a recession
59% of respondents believe 2023 will be a recession year. Of these, nearly 30% believe we are amidst a recession. Another 26% expect a recession in later 2022.
Story image
Edge Security
Security practices for modernising the “spaghetti” of on-premises IT
Many organisations are wondering how to securely modernise their workload, often made up of a “spaghetti” of on-premises applications and management consoles.
Story image
Malware
Kaspersky uncovers new malicious malware NullMixer
Kaspersky researchers have uncovered a new malware stealing users credentials, address, credit card data, cryptocurrencies, and accounts.
Story image
Customer Relationship Management
Diagnostic: Does your tech stack up for growth?
It’s common for tech companies to encounter limitations in their tech stack as they experience growth. After all, at first, you only need to invest in systems to support the needs of an early-stage or single-entity business.
Story image
Cybersecurity
De-risking the innovation cycle – a modern, real-time approach to security
Many organisations see cybersecurity as an inhibitor of innovation, with burdensome protection measures standing in the way of progress and speed.
Story image
Cloud
How modern IT architectures are moving beyond network visibility
Dealing with multiple cloud providers makes it difficult to identify security threats and performance bottlenecks and troubleshoot issues.
Story image
Payroll systems
Video: 10 Minute IT Jams - An update from UKG
Charlie DeWitt and Greg McManus join us today to discuss the importance of payroll in todays operating environments, and why automated processes can often be a key driver of success.
Story image
Artificial Intelligence
SnapLogic announces its partnership with Snowflake
For joint customers, SnapLogic offers the scalability needed to make the amount of data stored in Snowflake’s data cloud available and actionable for business'
Story image
Cybersecurity
Ransomware attacks continue to increase, report finds
Nearly a quarter of businesses have suffered a ransomware attack, with a fifth occurring in the past 12 months.
Story image
Data Protection
Cloudflare brings Data Localisation Suite to more APAC businesses
This allows any business in these countries to service their data locally while benefiting from the speed, security, and scalability of Cloudflare’s global network.
Story image
Customer Relationship Management
New kid on the block: How your business can build up its online marketplace expertise
Without the support of a skilled team, it’s impossible to realise the benefits of an online marketplace in full, observes Marketplacer executive Anna Trifonopoulos, VP of Customer Delivery, Marketplacer.
Story image
Customer Relationship Management
Digitally evolve the smart way – federated content
Digital transformation became the ‘buzz word’ for many companies. Time to re-evaluate those old legacy systems, move to new and better ways of doing things
Story image
Software-as-a-Service
Enterprises yet to fully commit to cybersecurity - CompTIA
“Digital transformation driven by cloud and mobile adoption requires a new strategic approach to cybersecurity, but this poses significant challenges."
Story image
Kaspersky
Cybersecurity loopholes prevalent in South East Asia
In terms of the share of vulnerabilities with publicly available exploits, three countries out of top five are located in Southeast Asia.
Story image
Cybersecurity
Test your API Security with Infinite API Scanner
The effectiveness of API scanning technology can mean the difference between successful and unsuccessful programming outcomes, and often enterprises and IT leaders struggle to get it right.
Story image
Artificial Intelligence
ServiceNow improves operational intelligence with new solutions
"We are helping customers create more resilient, secure, and productive business models, so they can navigate uncertainty with confidence.”
Story image
Virtual Private Network
95% of organisation rely on VPN as threats continue - report
There is a growing number of VPN-specific security threats and a need for Zero Trust security architecture in enterprise-level organisations.
Story image
Data analytics
Pronto launches Xi innovation to bring data to light
With the importance of digital transformation, having an ERP and analytics solution to bring data to light is critical.
Story image
Threat intelligence
Trellix advances threat intelligence with new research centre
Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.