Discover the latest insights from Kaspersky Security Network (KSN) as global cybersecurity and anti-virus company Kaspersky reveals the nations most at risk from online threats. Stay informed and protect yourself from emerging cyber dangers.
The global cybersecurity and anti-virus company Kaspersky has made new information from its Kaspersky Security Network (KSN) available that identifies which nations are most at risk from online threats.
According to KSN data, Nigeria is now ranked 50th, South Africa is 82nd, and Kenya is 35th. At the recent GITEX Africa conference, which was hosted in Morocco, Kaspersky revealed that all three of these nations have recently turned into hotspots for cyber attacks.
Dr. Amin Hasbini, head of Kaspersky’s global research and analysis team (GReAT) for META, discussed many trends in cyberthreats at the event. He issued a warning to leaders in business and technology about the two main types of cyberattacks: criminal and sophisticated.
“The goal of financial gain is primarily what motivates criminal attacks. On the other hand, sophisticated attacks show how cyber threat actors continuously modify their strategies and equipment to circumvent security precautions. The continually shifting geopolitical environment has a huge impact on the attacks that occur throughout Africa. However, there is rising concern about the fact that hackers are honing their skills by studying successful advanced attacks, according to Dr. Hasbini.
Most typical sorts of attacks
The most frequent threats in South Africa (106,000 attack attempts) were backdoor and spyware attacks. According to the KSN, they were widespread in Kenya and Nigeria as well, amassing 46,000 and 143,000 people, respectively. Despite these high numbers in Kenya, the cybersecurity company cautioned that organizations should be cautious of exploit assaults. With 177,000 occurrences blocked, this type of attack was the most prevalent in Kenya.
Unsettlingly, Kaspersky also called attention to the rise of zombie machines, particularly in South Africa. There have so far been found to be 1.6 million zombie machines throughout the nation, with an additional 300,000 in Kenya.
A connected device that joins a botnet is referred to as a zombie machine. Examples of certain technology that could be harmed include:
- legacy, dated, and unremembered devices,
- IoT gadgets
- network hardware
- Printers
- Cameras
- Including coffee makers
How to respond when someone is on your back
Several ransomware organizations targeting African targets were signaled in Dr. Hasbini’s presentation. The majority of cyber threats during the past year have targeted vital infrastructure, financial institutions, governments, and service providers. Different threat actors have been seen to attack diverse businesses across industries.
Of course, it makes sense that firms might be worried about these numbers and the escalating issues. But Kaspersky provided comfort. It demonstrated how businesses can get ready to handle the threat. It is essential to ensure that data is analyzed throughout the cycle, not just at the conclusion. Extended detection and response (XDR) solutions can be used to accomplish this.
Implementing XDR just adds another layer of defense to an organization’s infrastructure, according to Kaspersky, who stressed the need of using a multi-layered defensive strategy. Additionally, the technology offers a number of advantages. It offers analytical and automation functions for the detection and eradication of present and potential dangers in addition to safeguarding every access point against attack.
However, technology is only as good as the person using it. Therefore, educating personnel is a crucial investment that businesses must spend. They must receive ongoing instruction and have immediate access to information on the newest attack strategies.
Businesses should think about utilizing cutting-edge technologies like threat feeds, security information and event management systems, endpoint detection and response solutions, and tools with digital forensics and incident response capabilities, according to Dr. Hasbini. Understanding that cyber security efforts are ongoing and that there is no one-size-fits-all method to secure a corporate network or data is crucial.