Categories: MalwareSecurity

Security threat landscape in the Middle East … the mined cyber area

Analysis of the cyber threat landscape in the Middle East region provided by Tim Rains, director of Trustworthy Computing at Microsoft, at RSA 2014.

Middle East is historically a critical area for the diplomacy, but there is the same critical under the cyber security profile. The governments, the enterprises and the organizations present in the area are privileged targets for numerous categories of actors, like cyber criminals and state-sponsored hackers.

Events like Stuxnet case and Saudi Aramco cyber attacks are considered milestones in the history of high-profile malware attack. Data proposed by Microsoft Security Intelligence Report, Volume 15  links a variety of different socio-economic factors in the evolution of cyber threats in different countries, including the Middle East.

Microsoft has identified 11 factors as key indicators able to influence the overall cyber security of a country or of an entire region, government stability and level of corruption perceived may have a serious impact on the diffusion of cyber threats.

Rule of law, stability of the regime and literacy rate in conjunction with other factors, including the economic development and digital access can influence the health of a country under cyber security perspective.

“Malware infection rates are much higher in regions where there are raised levels of strife and turmoil. Political protests and unrest lead to an increased malware infection rate, for example” “Regional cyber vulnerabilities are not linked to any single factor”,  “but to a variety of different socio-economic factors”. Tim Rains, director of Trustworthy Computing at Microsoft, explained.

The analysis of malware diffusion in different states in the area, including Bahrain, Kuwait, Oman, Qatar, Saudi Arabia and the United Arab Emirates, shows infection rates of 10 to 12.9 computers per thousand, nearly twice the worldwide average for infection rates. The situation is more alarming if we consider data of the remaining countries in the Middle East, which is almost five times the world average.

Egypt, Palestinian Authority, Syria, Pakistan and Iraq have an infection rate ranging between 25 and just over 30 computers per thousand, very disturbing is data related to Turkey as reported in the following image.

 

 

Tim Rains has made an intriguing presentation at the recent RSA conference 2014 in San Francisco about the security threat landscape in the Middle East titled “A deep dive into the security threat landscape of the Middle East/Southwest Asia” which contains a detailed analysis of the cyber threat landscape in the Middle East region.

Rains also enumerated the best practices adopeted by countries with low infection rates:

  1. Strong public – private partnerships aimed at driving down infection rates.
  2. CERTs, ISPs and others actively monitoring for threats in the region.
  3. An IT culture where system administrators respond rapidly to reports of system infections or abuse.
  4. Enforcement policies and active remediation of threats via quarantining infected systems on networks.
  5. Regional education campaigns and media attention.
  6. Low software piracy rates and widespread usage of Windows Update/Microsoft Update.

Let me close with a paradigm cited in the slides:

“Nations with below average digital access tend to see increases in CCM as they improve tech access, meanwhile Nations with above av3rage digital access tend to see decreases in CCM as they improve tech access.”

Pierluigi Paganini

(Security Affairs –  Middle East, malware)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

4 hours ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

4 hours ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

16 hours ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

1 day ago

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

1 day ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

2 days ago

This website uses cookies.