The threat of cyber crime in Indonesia is increasingly worrying. According to the 2021 National Cyber Security Index (NCSI) survey, Indonesia ranks 5th out of 10 ASEAN countries with an index score of 38.96 and ranks 77th out of 160.
Then, how did the phenomenon of cyber attacks occur in Indonesia? How to prevent? For more details, see the following article to find out how to prevent cyber attacks.
The Phenomenon of Cyber Attacks in Indonesia
In general, cyber attacks are a way for hackers to carry out various attacks to access sensitive company data. The data will be illegally sold by hackers to get money or to commit a number of frauds.
According to the National Cyber and Crypto Agency (BSSN), at least 888,711,736 cyber attacks hit Indonesia from January to August 2021. This number has doubled compared to the previous year. In comparison, there were 290 million cyber attacks in Indonesia in 2019 and 495 million in 2020.
BSSN detects various cyber attacks ranging from data leaks, identity theft, malware attacks, and information data collection to find security holes.
Meanwhile, the highest to lowest distribution of cyber attacks covered the academic sector at 38.3 percent, the private sector at 25.37 percent, local government at 16.86 percent, central government at 8.26 percent, law at 4.18 percent, and personal by 2.66 percent.
Based on these findings, companies must understand the types of cyberattacks and prepare the right steps to reduce cyberattack activity in 2022.
14 Types of Cyber Attacks, 4 of which Will be a Trend in 2022!
2021 is arguably the worst record in cybersecurity history. The presence of the COVID-19 pandemic seems to have contributed to the cyber pandemic with many data leaks, identity theft, and malware attacks.
Here are the types of cyber attacks that often occur.
1. Crypto Mining
Malware and infostealers are aggressively attacking cryptocurrency owners to exchange their digital wallet addresses and profit from it.
2. Social Engineering
This attack can be carried out in combination with other attacks to get the victim to click on a link, download malware, or trust a malicious source or site.
3. Data Leakage
Data leakage can be defined as unauthorized transmission of data from within an organization to external destinations or recipients. The term can be used to describe data that is transferred electronically or physically.
4. Hacking
Hacking is the activity of breaking into another party’s computer program. Usually, hackers will take over network systems, social media accounts, banking accounts, steal data, and others.
5. Cross-Site Scripting (XSS)
A type of injection in the form of a malicious script that is injected into a vulnerable or trusted site. This script can access cookies, session tokens, or other sensitive information stored by the browser.
6. SQL Injection
This type of injection is in the form of SQL commands which are injected into the input data-plane to affect the execution of predetermined SQL commands.
7. Clickjacking
A type of attack on a web application in which the victim accidentally clicks on a web page element. These clicks can activate malicious functions that have been created by attackers, ranging from leads following social media accounts to taking money from users’ bank accounts.
8. DoS (Denial of Service)
DoS is a cyberattack that attempts to disable a website so that it cannot be accessed by users.
The repeated attacks were carried out by hackers so that the first site was down. The more incessant the attack, then we can be sure that gradually the website will become completely paralyzed.
9. Credential Reuse
This type of cyberattack targets username, password and PIN data that are similar or the same in several accounts, so it becomes an attack threat from Credential Reuse.
10. Man in the Middle
As the name implies, this type of cyberattack places the hacker in the middle of a communication between two people. When you are communicating, various important information shared between the two can be stolen by hackers.
In addition to the types of cyber attacks above, Darktrace, a cybersecurity service provider company estimates that there will be 4 cyber attacks that will become a trend in 2022, including.
11. Insider Threat
Threats originate from people within the organization, such as employees, former employees, or business associates, who have inside information about the organization’s security practices, data, and computer systems.
For example, when the finance division has an employee database and other divisions try to access it, it is very risky to experience internal data leaks.
To address this issue, the Darktrace solution works to detect and respond to anomalies across the enterprise, no matter when or where an insider threat occurs. Cyber AI from Darktrace learns the digital DNA of every user and device in an organization.
Such a contextual approach allows Darktrace to detect subtle deviations in behavior, applying advanced AI to thwart targeted attacks that must have originated within the company.
12. Phishing
Phishing is a type of online fraud in which cybercriminals impersonate legitimate organizations via email, text messages, advertisements or other means to steal sensitive information. This is usually done by including a link that will take you to the company’s website to fill in your information.
About 94 percent of malware will be sent via email and use social engineering techniques to trick recipients or victims.
The Darktrace AI solution, through a unique understanding of the digital fingerprint of the business, is able to detect that the e-mail is invalid and potentially malicious. Darktrace flags this to users and enterprise security teams, and they can prevent potential crises.
This prompted organizations to embrace Darktrace technology and companies have Antigena Email set to ‘On’ mode, where AI independently intervenes to prevent phishing emails.
13. Ransomware
Ransomware is a malware attack that uses encryption methods to store and hide the victim’s information as a prisoner.
The ransomware will encrypt the victim’s important data and devices with a key that only the cybercriminal has.
To regain access to encrypted files, databases and applications. The victim must pay the ransom demanded by the perpetrator.
Ransomware is often to spread across networks by targeting databases and file servers to incapacitate systems instantly.
Responding to ransomware attacks, Darktrace presents solutions using Self-Learning AI and Autonomous Response technologies to combat ransomware, taking targeted and proportionate actions to address threats, without disrupting your business.
14. Malware
Some of the most dangerous threats that Darktrace has encountered use self-modifying technologies to hide their presence on the network.
This attack can dynamically change threat signatures automatically to extract data, and spread it. Recently, Darktrace discovered anomalous activity on the network. Upon investigation, Darktrace discovered that the “Smoke Malware Loader” anomaly used various techniques to circumvent internal security.
The malware generates fake traffic to hide data theft activity. Darktrace observed the initial infection when anomalous executables were transferred via plain text to enterprise servers, and allowed malware attacks to bypass network perimeter controls.
Responding to these types of cyber attack threats, of course, an increase in privacy protection and cyber data security is needed. Darktrace Antigena is here as a solution for your cyber attack security system and data security. Why Darktrace Antigena? What are the advantages and conveniences that you will get?
Darktrace Antigena Defense Solution from Cyber Attacks
Responding to the three threats of cyber attacks above, extra protection is needed for privacy and cyber data security. Antigena’s Darktrace solution is here to answer your cyberattack and data security challenges.
Darktrace Antigena features Autonomus Response security technology to stop cyber threats and respond to ransomware in 10 seconds, without disrupting your business operations. Here are security features to protect all your digital infrastructure.
1. Network
Automatically detects all anomalous behavior indicating cyber attack on network systems.
2. Clouds
With Autonomous Response technology, Darktrace Antigena takes dynamic actions in seconds to neutralize unexpected attacks in the cloud.
3. E-mail
Automated actions to neutralize email attacks, as well as intervene to protect employees from spear phishing and other threats.
4. SaaS
Darktrace Antigena protects your workforce from subtle attacks and multiple attacks that circumvent static and stealthy defenses.
5. Endpoint
Applying a ‘pattern of life’ to ransomware-infected endpoint devices, stopping command and control.
Read more : Ketahui Alasan Internet Security Penting untuk Bentengi Bisnis Anda
Get Darktrace Antigena on Helios
It’s time to create a cyber security system with Darktrace Antigena. You will get Darktrace Antigena with Autonomus Response security technology to stop cyberattacks and respond to ransomware in 10 seconds, without disrupting your business operations.
Get Darktrace Antigena from Helios Informatika Nusantara (HIN). Helios as Darktrace Antigena’s partner in Indonesia will assist companies starting from the consulting, deployment, to after-sales support stages. Professional and certified IT team will help you avoid trial and error. Find out more about Darktrace Antigena by contacting us via [email protected].
Penulis: Ary Adianto
Content Writer CTI Group