pwshub.com

Microsoft warns of 600 million daily attacks and advanced tactics by nation-state actors

Serving tech enthusiasts for over 25 years.
TechSpot means tech analysis and advice you can trust.

Bottom line: A new security report by Microsoft paints a picture of a cyberworld where sophisticated technologies, state-sponsored activities, and criminal enterprises are converging to present unprecedented challenges. A collective effort and vigilance are more essential than ever amid this evolving landscape.

Over 600 million cybercriminal and nation-state attacks occur daily, targeting individuals, businesses, and governments alike, according to Microsoft's newly released Digital Defense Report for 2024.

A major theme running through the 110-page report is the growing sophistication of cyber attackers. Both cybercriminals and nation-state actors use advanced technologies, including generative AI, to increase the effectiveness of their malicious activities. This technological leap has made attacks more complex and challenging to defend against.

One of the most alarming findings is the increasing collaboration between cybercrime gangs and nation-state groups. These unlikely alliances share tools and techniques, blurring the lines between criminal enterprises and state-sponsored cyber operations. This cooperation has also led to more potent and diverse attack strategies.

Nation-state actors, in particular, have expanded their cyber operations. Their motivations range from financial gain to intelligence gathering, explicitly focusing on military targets. The report notes that these actors frequently employ info stealers and command-and-control frameworks in their operations.

For example, Russian threat actors have reportedly outsourced some of their cyberespionage operations to criminal groups, particularly those targeting Ukraine. In one instance, a suspected cybercrime group compromised at least 50 Ukrainian military devices using commodity malware.

Iranian actors have taken a different approach, combining ransomware attacks with influence operations. In a notable case, they marketed stolen data from an Israeli dating website, offering to remove individual profiles for a fee.

North Korea has also entered the ransomware arena. The report identifies a new North Korean actor that developed a custom ransomware variant called FakePenny. This malware was deployed against aerospace and defense organizations, showcasing intelligence gathering and financial motivations.

Chinese cyber activities remain consistent with previous years, focusing primarily on Taiwan and Southeast Asian countries. The intensity and geographic targeting of these operations have not significantly changed.

As the US presidential election approaches, concerns about foreign interference have resurfaced. However, the report suggests that public discourse on this issue is less prominent than in the 2020 election cycle. Nevertheless, Microsoft warns that Russia, Iran, and China are actively exploiting ongoing geopolitical issues to sow discord and undermine confidence in democratic processes.

Besides the United States and the United Kingdom, nations experiencing active military conflicts or regional tensions are primary targets. These include Israel, Ukraine, the United Arab Emirates, and Taiwan.

Microsoft emphasizes the need for a collaborative approach to address these escalating threats. Redmond is calling for increased cooperation between the public and private sectors – a strategy that needs to include not only technological advancements but also policy changes and improved cybersecurity practices across all levels of society.

"This means implementing and enforcing policies and tooling, such as enhanced multifactor authentication and attack surface reduction rules," according to the report. "At the same time, as the threat landscape evolves, securing identities, hardening endpoints, and protecting the cloud infrastructure has become more important than ever."

Source: techspot.com

Related stories
1 month ago - Gartner thinks generative AI is right for only five percent of workloads AI techniques that require specialist hardware are "doomed," according to analyst firm Gartner's chief of research for AI Erick Brethenoux – who included GPUs in...
1 month ago - Nvidia, Equinix clearly making a killing over costs, confusion, and cold feet Enterprises are still struggling with the business case for generative AI projects more than a year after the craze started, and we may have to wait until the...
1 month ago - Chatbots, generative models 'in many ways the next step in the surveillance economy' Web browsers now commonly sport AI services provided by on-device or cloud-based models. However, a few holdouts remain convinced it's a bad idea.…
3 weeks ago - CISA warns of scammers impersonating its officials. Tech expert Kurt “CyberGuy" Knutsson urges people to be alert and verify contacts.
1 week ago - OpenVMM touts stronger security, but not ready for prime time just yet Microsoft earlier this month published code for a new hypervisor, or virtual machine monitor (VMM), written in Rust.…
Other stories
3 minutes ago - AI model repo promises lower costs, broader compatibility for NIMs competitor Hugging Face this week announced HUGS, its answer to Nvidia's Inference Microservices (NIMs), which the AI repo claims will let customers deploy and run LLMs...
12 minutes ago - In moments of stress, you can use intentional breathing to help ground yourself. These are the top five beginner exercises to start with.
12 minutes ago - Our moon goes through phases and sometimes turns red or disappears into shadows. Here's what you need to know about the full moon.
12 minutes ago - These are our favorite HP laptops from the company's OmniBook, Pavilion, Envy, Spectre and Transcend lines -- all tested and reviewed by CNET editors.
12 minutes ago - Keep better track of your heating and air conditioning by using a smart thermostat, with many different makes and models now at great discounts.