Sheikh Hamdan joined the kids as they browsed through some photos that captured how they used broomsticks and helped their community
Government, manufacturing, energy and telecom industries in the UAE and the Middle East are more likely to be targeted by cyber attacks. These groups penetrate using carefully planned multi-stage attacks aimed at specific economic sectors, a new study has revealed.
Released by Positive Technologies on Wednesday, the study revealed that the military-industrial complex, finance, mass media, IT and science and education were the other sectors that were mostly targeted by the cybercrime group.
Among the countries, Saudi Arabia, UAE, Israel, Jordan, Egypt, Kuwait and Lebanon were mainly targeted by the group through phishing emails and exploited vulnerabilities in public-facing applications.
Yana Avezova, a senior analyst with the Positive Technologies research team, said an overwhelming majority of groups active in the Middle East attacked governments and industry at least once. “It is worth noting that government agencies were the most attractive targets for all malicious actors in 2022–2023. These accounted for 22 per cent of total attacks on organisations in the Middle East,” said Avezova.
According to the report, two of the five most-attacked sectors, targeted by half of all groups, were telecommunications and the military-industrial complex.
Compared with other regions of the world, the study said Middle Eastern media, too, have often found themselves a target of cyberattacks and historically have ranked high on the list.
“Complex, targeted attacks begin with reconnaissance. Attackers may conduct extensive network scanning to identify suitable targets. This gives them enough information for the initial stage of penetration. The information may include a list of applications installed on the target server and its versions containing known vulnerabilities. After reconnaissance comes the preparation of tools for the attacks. Cybercriminals may register fake domains and create email or social media accounts for spear phishing,” said Alexander Badaev, an information security threat researcher at Positive Technologies Expert Security Centre.
According to Badayev, after successfully gaining initial access, the attackers seek to establish a foothold in the infrastructure. To do this, 69 per cent of groups leveraged the task scheduler, an OS component that runs applications or scripts at a predefined time or in response to a certain event, as in the case of a campaign that targeted the UAE government, where a group named OilRig created a MicrosoftEdgeUpdateService scheduled task that ran every five minutes, launching malware. Most attackers – 56 per cent – configured malware to auto-run. A third of groups – 31 per cent – gained a foothold in victim companies' systems by setting up malware to run on a certain event, said the report.
ALSO READ:
Sheikh Hamdan joined the kids as they browsed through some photos that captured how they used broomsticks and helped their community
The family's furniture, household appliances as well as the books and stationery of the children were destroyed in the April 16 floods
The idea of undergoing the procedure was 'mentally and emotionally draining', the longtime Abu Dhabi resident said, but doctors eased her worries
This covers traffic violations incurred until 2023
Temperature will reach up to 36ºC and 33ºC in Abu Dhabi and Dubai, respectively
Youssef Al Feel, along with his brothers and cousins, managed to break the windows and enter flooded houses — moving people to safety for an entire day
The patient had endured years of severe pain and debilitating health complications due to the tumour
Earlier, the Emergency, Crisis and Disaster Management confirmed the reopening of all roads in the emirate