Table of Contents Table of Contents
Previous Page  29 / 60 Next Page
Information
Show Menu
Previous Page 29 / 60 Next Page
Page Background

25

Cybersecurity in ASEAN: An Urgent Call to Action

evade detection and to secure their malicious activities. The overall increases in encrypted traffic

and attacks render threat recognition difficult and create gaps in traditional, layered-defense

systems because intrusion prevention fails to occur.

Encrypted traffic analytics provide insight into threats in encrypted traffic using network

ana

l

ytics.

25

The focus is on identifying malware communications in encrypted traffic through

passive monitoring, the extraction of relevant data elements and supervised machine learning

with cloud-based global visibility.

The increasing uptake of virtual currency

Since Bitcoin, the first decentralized cryptocurrency, was released in early 2009, similar digital

currencies have crept into the worldwide market, including a spin-off called Bitcoin Cash.

Abuse of virtual currencies is on the rise (see figure 17).

2

5 Encrypted Analytics Traffic ,

Cisco

26

Hijacking Computers to Mine Cryptocurrency Is All the Rage ,

MIT Technology Review

, 5 October 2017

Source: A.T. Kearney analysis

Figure

Virtual currency is increasingly a target for cyberattacks

Wanna

Cry (

)

to

Average value

in bitcoins

demanded per

computer

,

Total amount

paid by

victims

million

Amount

extortionists would

have received if

all victims had

paid

Nayana

attacks

(

)

,

customers

Number a ected;

mostly small businesses

running websites

on Nayana’s

equipment

servers

Hit by ransom-

ware attack in

South Korea

million

Value in bitcoins

that Nayana paid

to save its

clients’ sites

Hostile

cryptocurrency

mining

. million

Number of

Kaspersky Lab’s

clients’ computers

that mining tools

were found on

( )

X

Jump in attacks

aimed at enterprise

networks between

January and

August  Petya

(

)

Value in bitcoins

demanded per

computer

,

Conservative

estimate of amount

that certain large

botnets could

generate per

month

Security experts have seen a spike in attacks over the past year, aimed at stealing computer

power for cryptocurrency mining operations.

26

Researchers have detected several large botnets

set up to profit from cryptocurrency mining along with a growing number of attempts to install

mining tools on organizations’ servers.

Illegal mining operations set up by insiders, which can be much more difficult to detect,

are on the rise. These are often carried out by employees with high-level network privileges

and the technical skills needed to turn their company’s computing infrastructure into

a currency mint.