January 17, 2017 By Larry Loeb 2 min read

So far in 2017, researchers from Control Risks have observed rising levels of advanced ransomware variants targeting high-value assets in Asia-Pacific, Forbes reported. This shift is reflective of the increasing sophistication and specialization of ransomware, which enables cybercriminals to identify organizations’ most valuable data and go after those targets.

Asia-Pacific Ransomware Attacks Increasing

In the past year, website ransomware, in which fraudsters infect elements of a webpage with malware to facilitate distributed denial-of-service (DDoS) attacks, has grown significantly.

Many examples of this attack are present in the Asia-Pacific region. For example, the researchers reported that the creator of the JapanLocker ransomware variant, known as Shor7cut, is likely a member of Indonesian cybercrime group Defacer Tersakiti. They also observed a variant called KimcilWare that targeted websites running on the Magento e-commerce platform, which was also likely developed in Indonesia.

Export Marketing

In March 2016, researchers from Kaspersky Lab discovered that more than 70 servers had been compromised by the CTB-Locker ransomware. Although the breach affected servers in 10 countries, most of the victims were located in the U.S. The incident demonstrated the cybergang’s ability to adapt a successful attack to infect new targets, then export the malware to another market for future harvesting.

Websites that facilitate financial transactions are particularly attractive targets for attackers. According to Control Risks research, financial fraudsters are particularly active in Bangladesh, Pakistan, India, the Philippines and Indonesia.

China’s Cybersecurity Law

But there are even more nations to watch in the Asia-Pacific region. The Chinese Cybersecurity Law (CSL), designed to codify the government’s control over critical infrastructure, is set to take effect in June 2017. According to Reuters, Chinese officials hope the controversial cybersecurity legislation will enable the government to create a “secure and controllable” domestic infrastructure.

Ransomware is just one of many sophisticated cyberweapons fraudsters will use to spread attacks beyond borders in 2017. Judging by experience, users can expect these strikes to hit the U.S. in the near future.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today