The number of successful cyberattacks in the Middle East tripled in Q1 2024 compared to the same period the previous year, a report showed on Wednesday.
According to a study by Positive Technologies, a leader in result-driven cybersecurity, as of Q2 2024, every second successful attack against organisations resulted in a data breach — the most frequent consequence of cyberattacks in the region during the studied period.
The report noted a significant increase in hacktivist attacks amidst the escalation of geopolitical conflicts. Moreover, the Middle East was a frequent target of APT groups.
Irina Zinovkina, head of information security analytics research at Positive Technologies, said: “The surge in hacktivist attacks in the Middle East indicates a shift in modern conflict strategies, with cyberattacks becoming an inherent component. Our forecasts suggest that rising tensions in the region can lead to more DDoS attacks on media and government institutions. Additionally, if groups form alliances, they could execute large-scale cyberattacks with greater destructive potential.”
APT groups in the region conducted complex and prolonged cyberattacks to steal data, gather information, or disrupt organizational operations. Nearly every cybercriminal group studied targeted government institutions at least once. Additionally, 69 per cent of these groups focused on the energy sector, indicating their intent to disrupt critical infrastructure.
The public sector was the most targeted industry, making up 24 per cent of all cyberattacks on organizations. Government institutions store and process vast amounts of confidential data, which can be a goldmine for cybercriminals. In the first half of 2024, 16 per cent of dark web listings for information from government companies were related to Middle Eastern countries.
The manufacturing sector comes in second among the most targeted sectors (17 per cent) and also faces cyberthreats involving wipers. Wipers erase data on compromised ICS devices, causing major disruptions to critical infrastructure. In attacks on Israeli companies, the BiBi wiper was used, rendering the data of targeted systems inaccessible or unusable. Overall, malware remained the most popular tool for attacking organizations in the region.
Cybercriminals also targeted institutions using social engineering tactics (54 per cent), even leveraging AI technologies. With the advancement of generative AI systems, the amount of malicious content surged, and email phishing attacks skyrocketed by 222 per cent in H2 2023 compared to H2 2022.
Experts found that the primary consequence of successful cyberattacks on organizations in the Middle East was data breaches. In Q3 2023, these accounted for 35 per cent, and by H2 2024, they surged to 49 per cent. The average damage from cyberattacks on organizations in the region is almost double the global average.
Given the heightened activity of cybercriminals in the region, experts recommend that companies adopt result-driven cybersecurity, a proactive approach to building cyber resilience. Result-driven cybersecurity helps build a comprehensive automated defense system against non-tolerable events—consequences of cyberattacks that could prevent an organization from achieving its operational or strategic goals.
According to Zinovkina, companies and government institutions in the UAE are facing diverse challenges that require comprehensive security measures and rapid response. “The government recognizes the importance of protecting critical infrastructure and data amidst growing cyberthreats, and is implementing legislative initiatives to bolster cybersecurity. For example, the UAE increased investments in cybersecurity as part of a new budget plan,” she added. Moreover, to enhance cybersecurity, local companies are investing heavily in cutting-edge technologies like AI and machine learning.
Combating attacks requires a special approach based on the concept of result-driven cybersecurity, Zinovkina said. “If this approach is successfully implemented, the infrastructure and processes are built in such a way that even if attackers penetrate the organization’s network, they cannot inflict non-tolerable damage. In other words, the primary goal becomes eliminating the possibility of non-tolerable events — incidents that prevent an organization from achieving its operational or strategic goals or lead to significant disruption of its core business due to a cyberattack,” she added.
You may also like
International Day for Eradication of Poverty: A Call for Collective Action
Hoax bomb threats to flights: Teenage boy, father under investigation for targeting Mumbai planes
Adorable stray dog who spent 10 months crying in kennel undergoes impressive transformation
'Felt incomplete': What Rahul Gandhi said after Omar Abdullah's CM oath
Insurance bodies meet with ministers to tackle the 'spiralling' costs of motor cover
'I clean celebrity homes and swear by these Home Bargains products'
Smoothies vs. Juices: What's the Ultimate Weight Loss Solution?
Jharkhand Party announces five candidates, party chief's children enter the fray
Centre will work closely with Omar Abdullah, his team: PM Modi
Channel 4 confirms future of A Place in the Sun with fresh update
Who was Sukha Duneke? How Canada is using routine NIA post to link India to goon's killing in Winnipeg
UAE, WEF launch knowledge-sharing platform to support 2031 national vision goals
Major Preps Done In By-Poll Bound Vijaypur & Budhni Assembly Constituencies, Says MP Chief Electoral Officer Sukhveer Singh
Nagaland Lottery Sambad Result Today LIVE 8 PM (16-10-2024); Dear Pelican Wednesday
Rents have soared in this area of the UK faster than anywhere else
'I thought I was dead when the Taliban found embarrassing item in friend's backpack'
Did Kamala Harris share fake news about Donald Trump's 'senior moment'?
Rajasthan CM to address investors meeting in London tomorrow
Martin Lewis issues 'act now' advice to anyone under 73
Ready to talk to Putin for peace in Ukraine, says Germany's Scholz