January 17, 2017 By Larry Loeb 2 min read

So far in 2017, researchers from Control Risks have observed rising levels of advanced ransomware variants targeting high-value assets in Asia-Pacific, Forbes reported. This shift is reflective of the increasing sophistication and specialization of ransomware, which enables cybercriminals to identify organizations’ most valuable data and go after those targets.

Asia-Pacific Ransomware Attacks Increasing

In the past year, website ransomware, in which fraudsters infect elements of a webpage with malware to facilitate distributed denial-of-service (DDoS) attacks, has grown significantly.

Many examples of this attack are present in the Asia-Pacific region. For example, the researchers reported that the creator of the JapanLocker ransomware variant, known as Shor7cut, is likely a member of Indonesian cybercrime group Defacer Tersakiti. They also observed a variant called KimcilWare that targeted websites running on the Magento e-commerce platform, which was also likely developed in Indonesia.

Export Marketing

In March 2016, researchers from Kaspersky Lab discovered that more than 70 servers had been compromised by the CTB-Locker ransomware. Although the breach affected servers in 10 countries, most of the victims were located in the U.S. The incident demonstrated the cybergang’s ability to adapt a successful attack to infect new targets, then export the malware to another market for future harvesting.

Websites that facilitate financial transactions are particularly attractive targets for attackers. According to Control Risks research, financial fraudsters are particularly active in Bangladesh, Pakistan, India, the Philippines and Indonesia.

China’s Cybersecurity Law

But there are even more nations to watch in the Asia-Pacific region. The Chinese Cybersecurity Law (CSL), designed to codify the government’s control over critical infrastructure, is set to take effect in June 2017. According to Reuters, Chinese officials hope the controversial cybersecurity legislation will enable the government to create a “secure and controllable” domestic infrastructure.

Ransomware is just one of many sophisticated cyberweapons fraudsters will use to spread attacks beyond borders in 2017. Judging by experience, users can expect these strikes to hit the U.S. in the near future.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today