January 17, 2017 By Larry Loeb 2 min read

So far in 2017, researchers from Control Risks have observed rising levels of advanced ransomware variants targeting high-value assets in Asia-Pacific, Forbes reported. This shift is reflective of the increasing sophistication and specialization of ransomware, which enables cybercriminals to identify organizations’ most valuable data and go after those targets.

Asia-Pacific Ransomware Attacks Increasing

In the past year, website ransomware, in which fraudsters infect elements of a webpage with malware to facilitate distributed denial-of-service (DDoS) attacks, has grown significantly.

Many examples of this attack are present in the Asia-Pacific region. For example, the researchers reported that the creator of the JapanLocker ransomware variant, known as Shor7cut, is likely a member of Indonesian cybercrime group Defacer Tersakiti. They also observed a variant called KimcilWare that targeted websites running on the Magento e-commerce platform, which was also likely developed in Indonesia.

Export Marketing

In March 2016, researchers from Kaspersky Lab discovered that more than 70 servers had been compromised by the CTB-Locker ransomware. Although the breach affected servers in 10 countries, most of the victims were located in the U.S. The incident demonstrated the cybergang’s ability to adapt a successful attack to infect new targets, then export the malware to another market for future harvesting.

Websites that facilitate financial transactions are particularly attractive targets for attackers. According to Control Risks research, financial fraudsters are particularly active in Bangladesh, Pakistan, India, the Philippines and Indonesia.

China’s Cybersecurity Law

But there are even more nations to watch in the Asia-Pacific region. The Chinese Cybersecurity Law (CSL), designed to codify the government’s control over critical infrastructure, is set to take effect in June 2017. According to Reuters, Chinese officials hope the controversial cybersecurity legislation will enable the government to create a “secure and controllable” domestic infrastructure.

Ransomware is just one of many sophisticated cyberweapons fraudsters will use to spread attacks beyond borders in 2017. Judging by experience, users can expect these strikes to hit the U.S. in the near future.

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today