Saturday, January 11, 2025
HomeCyber AttackRussian Hackers are Responsible for 58% of All Hacks on Government Networks...

Russian Hackers are Responsible for 58% of All Hacks on Government Networks – Microsoft

Published on

Microsoft has recently claimed that Russia is one of the most active countries in organized cyberattacks. Russian hackers were the most active in the world in implementing strong cyberattacks.

Russian hackers were responsible for 58% of all the cyberattacks that targeted Government networks. Not only this even the “Russian hackers” mostly target the countries like:-

  • The United States
  • Ukraine
  • Great Britain
  • The European states belonging to NATO

Till now Russia has been the nation-state threat actor that is conducting many types of attacks in different parts of the world. After Russia, Microsoft has detected that the largest amount of attacks came from North Korea, Iran, and China.

And on this list South Korea, Turkey, and Vietnam are also included, but with less volume of attacks.

Iran has been targeting Israel in the past year and during the attack, it has launched many devastating cyberattacks that have created huge tensions between the two countries 

Whereas, North Korea has been targeting cryptocurrency companies with the motive of profit as its economy was decreased by penalties and due to Covid-19.

Till now 21% of cyberattacks were being observed across nation-state threat actors that have targeted consumers. On the other side, 79% targeted enterprises that include 48% of the government, 31% of NGOs and think tanks, 3% education, 3% intergovernmental organizations, and many more.

Cybercrime

Nowadays ransomware attacks are increasing at a rapid speed, and that’s why cybercrime has become a common problem. However, the nation-state threat actors are mostly targeting victims that have valuable information, and the threat actors are also targeting the victims with money. 

To initiate different targets, the threat actors make different profiles to attack the victims. The United States is one of the most targeted countries that encounter more than threefold ransomware attacks.

Nowadays the cybercriminals are mainly focused on training themselves in differentiated off-the-shelf infection kits and expanding their use of automation, running down their costs, and increasing their scale. 

Till now ransomware remains to be one of the largest cybercrime perils and, in the past year, it has proceeded to develop and to become more disruptive.

Striving back in a hybrid work context

Among all, the online threats are the most common attack, and that’s why Microsoft has claimed that initiatives should be taken to strengthen the first line of defense. 

However, the organizations are exercising basic steps to defend themselves from this kind of attack, and the positive point is that, in the past 18 months, it has been recorded a 220% increase in strong authentication usage.

The companies have thought about improving their security posture in a remote work environment. But, the nation-states are increasingly using, and they will continue to attack, therefore companies need to increase the protection to keep themselves safe.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal....

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal....