Trend Micro 2015 security roundup finds crypto-ransomware and online banking infections continue to plague New Zealand

AUCKLAND, 9 March 2016 – Ransomware has given way to crypto-ransomware as the modus operandi of cybercriminals targeting New Zealand, according to Trend Micro’s annual security roundup report released today, ‘Setting the stage: landscape shifts dictate future threat response strategies.’

With data increasingly being held hostage locally and across the globe, crypto-ransomware rose to 83 percent of overall ransomware use in 2015. Cryptowall was the most frequently used variant, arriving on users’ computers via email or malicious downloads.

Ransomware and crypto-ransomware threats are specifically targeting New Zealand businesses and consumers, carefully crafting their attacks to breach security systems by looking and feeling legitimate to users.

“Crypto-ransomware threats have a significant impact on businesses; often the damage done due to downtime and data recovery costs is well beyond the ransom required to restore the files,” said Indi Siriniwasa, enterprise sales and channel director for Trend Micro Australia and New Zealand. “Businesses across New Zealand need to consider their response to these threats which demand a holistic approach to IT security.”

The annual Trend Micro security roundup report dissects the most significant security incidents from 2015. The research confirms attackers are now bolder, smarter and more daring in attack vectors, cyberespionage efforts and cyber underground activity on a global basis.

The report showed that online banking infections in New Zealand continued to increase, presenting a growing concern for consumers. New Zealand saw 366 infected PCs in the fourth quarter of 2015, up from 170 in Q3.

“Our observations for 2015 have confirmed that traditional methods of protecting data and assets are no longer sufficient and should be reassessed to maintain the highest level of corporate and personal security,” continued Indi Siriniwasa. “The prevalence and sophistication of extortion, cyberespionage and expanding targeted attacks now dictate that organisational security strategies must be prepared to defend against a potentially greater onslaught in 2016. This realisation can help the security community better anticipate and respond to what attackers are trying to accomplish.”

“Cybercriminals are continuing to target consumers in increasingly sophisticated ways, catching New Zealanders unaware of the threats and falling victim to cybercrime,” said Tim Falinski, consumer director, Trend Micro Australia and New Zealand. “With Android malware around the world now at 10.6 million and climbing, and crypto-ransomware targeting ordinary people as well as businesses, consumers should make themselves aware of the threats and ensure all their devices – from smartphones to PCs to connected smart devices – are protected.

Online extortion and cyberattacks were a top concern in 2015, with several high-profile organisations being victimised. Ashley Madison, Hacking Team, the Office of Personal Management and Anthem were a few of these high-profile attacks that left millions of employees and customers exposed.

Additional report highlights include:

  • Pawn Storm and zero-days – In 2015 there were more than 100 zero-days discovered in addition to the long-running cyberespionage campaign Pawn Storm, which utilised several zero-day exploits to target high-profile organisations, including a U.S. defence organisation, the armed forces of a NATO country and several foreign affairs ministries.
  • Deep Web and underground explorations – In 2015, cybercriminal markets began to penetrate the recesses of the Deep Web. Each underground market mirrors the culture in which it resides, offering specific wares most profitable in each region.
  • Smart technology nightmares – Attacks against connected devices accelerated in 2015, proving their susceptibility. Smart cars and businesses, seen in Trend Micro’s GasPot experiment, were among a few of the new concerns brought by IoT technologies.
  • Angler, the ‘King of Exploit Kits’ – From malvertising to Adobe Flash, Angler Exploit Kit gained notoriety in 2015 as the most used exploit. Accounting for 57.3 percent of overall exploit kit usage, Japan, the U.S. and Australia were among the most impacted countries for this attack.

 

For the complete report, please visit here.

About Trend Micro

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organisations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defence techniques optimised for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organisations to simplify and secure their connected world. www.trendmicro.com

Lisiane Lenz

Tel: (971) 505785061

Email: Amea_PR@trendmicro.compr@trendmicro.com.au