Friend
Professional
- Messages
- 2,653
- Reaction score
- 845
- Points
- 113
65% of cyberattacks in the country involve the use of malware.
The Republic of Kazakhstan ranked second in terms of the number of cyberattacks (8%), according to a recently presented study of current cyber threats to the CIS countries in 2023 and the first half of 2024. The most frequent target of cybercriminals in Kazakhstan was the media, which accounted for 19% of attacks. The majority of cyberattacks (65%) involved the use of malicious software. As a result of more than a third of attacks (35%), confidential information was leaked.
The high interest of cybercriminals in Kazakhstan is confirmed by a significant number of ads on the dark web related to this country. In terms of the number of mentions among other members of the Commonwealth, the republic ranks third. The most common are ads for the sale of fake documents (48%) and cash-out services (38%). The cost of false documents varies from 7 to 2700 USD.
In addition to the media, government agencies (12%), financial institutions (12%) and telecommunications companies (7%) became popular targets of cybercriminals. Kazakhstan is one of the three CIS countries where the telecommunications industry is subjected to the largest number of attacks. Attackers seek to gain access to the servers of telecommunications companies in order to extract new data on a regular basis. There is a known case when, after the publication of confidential information of a Chinese company on GitHub in February 2024, it turned out that cybercriminals had been fully controlling the infrastructure of Kazakh telecom operators for more than two years.
When trying to steal information, attackers most often sought to obtain personal and credentials using special malware - infostealers RedLine, Vidar, Raccoon and AZORult. Stolen information is usually used in subsequent attacks, sold or distributed for free on the dark web. Prices for databases of residents of the CIS countries range from 100 to 50,000 US dollars.
In 74% of cases, malware was delivered to victims' computers through phishing emails. For example, in December 2023, a mailing to a Kazakh government agency aimed at infecting with the SugarGh0st Trojan was detected.
Social engineering methods were used in 53% of all attacks against Kazakhstan. In June 2024, Positive Technologies specialists recorded a phishing email sent to an employee of a Kazakh organization. The email contained a request to update the password, and the change form was in the attached HTML file. When a new password was entered, the data was redirected to a legitimate service for filling out forms, from where it got to cybercriminals.
Source
The Republic of Kazakhstan ranked second in terms of the number of cyberattacks (8%), according to a recently presented study of current cyber threats to the CIS countries in 2023 and the first half of 2024. The most frequent target of cybercriminals in Kazakhstan was the media, which accounted for 19% of attacks. The majority of cyberattacks (65%) involved the use of malicious software. As a result of more than a third of attacks (35%), confidential information was leaked.
The high interest of cybercriminals in Kazakhstan is confirmed by a significant number of ads on the dark web related to this country. In terms of the number of mentions among other members of the Commonwealth, the republic ranks third. The most common are ads for the sale of fake documents (48%) and cash-out services (38%). The cost of false documents varies from 7 to 2700 USD.
In addition to the media, government agencies (12%), financial institutions (12%) and telecommunications companies (7%) became popular targets of cybercriminals. Kazakhstan is one of the three CIS countries where the telecommunications industry is subjected to the largest number of attacks. Attackers seek to gain access to the servers of telecommunications companies in order to extract new data on a regular basis. There is a known case when, after the publication of confidential information of a Chinese company on GitHub in February 2024, it turned out that cybercriminals had been fully controlling the infrastructure of Kazakh telecom operators for more than two years.
When trying to steal information, attackers most often sought to obtain personal and credentials using special malware - infostealers RedLine, Vidar, Raccoon and AZORult. Stolen information is usually used in subsequent attacks, sold or distributed for free on the dark web. Prices for databases of residents of the CIS countries range from 100 to 50,000 US dollars.
In 74% of cases, malware was delivered to victims' computers through phishing emails. For example, in December 2023, a mailing to a Kazakh government agency aimed at infecting with the SugarGh0st Trojan was detected.
Social engineering methods were used in 53% of all attacks against Kazakhstan. In June 2024, Positive Technologies specialists recorded a phishing email sent to an employee of a Kazakh organization. The email contained a request to update the password, and the change form was in the attached HTML file. When a new password was entered, the data was redirected to a legitimate service for filling out forms, from where it got to cybercriminals.
Source