Story image

The threatening cyber landscape of the Melbourne Cup

31 Oct 2016

The Melbourne Cup officially kicks off tomorrow, and Jeffrey Kok, senior director of Pre-Sales Asia Pacific and Japan at CyberArk has a few tips for Australians betting their money on the ‘race that stops the nation’.

"As betting online becomes bigger and bigger business, virtual platforms are a cornerstone of the gambling industry, with tens of millions of dollars invested in the infrastructure and expertise needed to entice punters to their sites and cater to the thousands upon thousands of transactions that take place on a daily basis – with matters coming to a peak as race day approaches,” he explains. "As with any business that depends on internet-related business for its livelihood, the gambling houses have also heavily invested in security to keep their sites up and running.”

Kok adds that the types of protection that are in place aren’t always enough to stop ransomware.

"Ransomware is software that, simply put, encrypts files and data on the victim’s infrastructure blocking any usage of such files and data until a sum of money is paid,” he says.

“It has been used to target individuals but is increasingly a problem for enterprises as hackers seek to maximise revenues.”

In order need to combat these threats, here are Kok’s five pieces of advice:

  1. Most anti-malware and anti-ransomware solutions today focus on detecting and blocking malware at the point of inception. These solutions can be helpful when you know what you’re looking for – but when it comes to ransomware, there are new variants coming out every day.
  2. Standard ransomware just infects user machines; this is the same ransomware that would infect a regular consumer at home. These attacks will be opportunistic and less damaging to organisations.
  3. Advanced ransomware is far more dangerous. These ransomware attacks follow the same general attack pattern as targeted network attacks, but for a very different end goal. Instead of information theft, ransomware attackers seek to cause widespread havoc through mass infection and encryption of user data.
  4. Removing local privileges (the ability to access more sensitive parts of the network) from regular PCs can help defend against ransomware attacks.
  5. An effective approach is to protect the sensitive files in your organization from the damage that often results from ransomware attacks. Employing greylisting - an approach that allows unknown applications (e.g. the latest ransomware variant) to execute harmlessly - blocks ransomware from being able to access or encrypt your critical files.

"To effectively defend against such ransomware attacks, organisations must combine the principle of removing local privileges and. application control to reduce the attack surface and block their progression."

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Telstra’s 2019 cybersecurity report
Cybersecurity remains a top business priority as the estimated number of undetected security breaches grows.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Why cybersecurity remains a top business priority
One in two Australian businesses estimated that they will receive fines for being in breach of new legislation.