Financial motives drive rising cyberattacks


Experts warned that data is showing that the number of known ransomware groups has increased as the groups splinte.

PETALING JAYA: The cybersecurity threats to companies could likely become more proliferated as the cybercriminal groups splinter into new sub-groups and ramp up attacks.

Experts warned that data is showing that the number of known ransomware groups has increased as the groups splinter, and in the process, some have become less predictable.

“Driven primarily by financial reasons, the cybersecurity attacks can be due to various factors,” said Jonathan Crompton, partner at RPC.

“One of them is that there is an increase in regulation across Asia, which means that companies are becoming more acutely aware that they need to notify, and so they become a ‘better’ target.

“Another rationale that we see is that companies in certain jurisdictions, including Malaysia, can be less secure than others because they haven’t reached the same cybersecurity maturity that there is in other places. That will come.

“There may be other more politically-motivated factors why Malaysian companies are being targeted,” he said in Kuala Lumpur yesterday after a roundtable discussion on cyber incident and data breach response.

Last week, Bursa Malaysia stated a few brokerages had encountered cybersecurity incidents within their system components but without any evidence of unauthorised trading or financial loss.

The exchange’s platforms, networks and infrastructure were not compromised but Bursa Malaysia had directed all brokers and selected vendors to conduct comprehensive screening of their systems.

The attack at the unnamed brokerages in the public market was the second incident in less than a year.

Apart from the ransomware threat becoming proliferated, the members of splintered groups may be going after the same targets again under their new groups as well as new targets.

The evolution of computing power could present another challenge in the future.

“The current topic of conversation is threat actors’ tactic to extract and hold.

“Just extract it from the system and then hold it until the quantum computing system is able to crack the protections in place.

“So that's a current issue but for a future problem,” he warned.

Follow us on our official WhatsApp channel for breaking news alerts and key updates!

Next In Business News

Foundation challenge for supertalls
Building tomorrow’s homes with AI
Ringgit likely to trade within RM3.90-RM3.95 level next week, ahead of Trump-Xi meeting
Cape EMS clarifies termination of AeroNas collaboration
Penang cruise market sees 39% more passengers in 1Q
IGL Coating�its way to the top
Credit conditions tightening
Flexible bets deliver gains
Choppy gains amid rising risks
Brazil’s diverse metropolis beckons

Others Also Read