{"id":77378,"date":"2024-04-29T03:02:52","date_gmt":"2024-04-29T07:02:52","guid":{"rendered":"https:\/\/blog.cyberconservices.com\/?p=77378"},"modified":"2024-04-26T15:10:54","modified_gmt":"2024-04-26T19:10:54","slug":"hackers-are-carrying-out-ransomware-experiments-in-developing-countries","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2024\/04\/29\/hackers-are-carrying-out-ransomware-experiments-in-developing-countries\/","title":{"rendered":"Hackers are carrying out ransomware experiments in developing countries"},"content":{"rendered":"<p>By <a href=\"https:\/\/arstechnica.com\/author\/financialtimes\/\" rel=\"author\">ELLESHEVA KISSIN<\/a> &#8211;\u00a0Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia, and South America before targeting richer countries that have more sophisticated security methods.<\/p>\n<p>Hackers have adopted a \u201cstrategy\u201d of infiltrating systems in the developing world before moving to higher-value targets such as in North America and Europe, according to a report published on Wednesday by cyber security firm Performanta.<\/p>\n<p>\u201cAdversaries are using developing countries as a platform where they can test their malicious programs before the more resourceful countries are targeted,\u201d the company told Banking Risk and Regulation, a service from FT Specialist.<\/p>\n<p>Recent ransomware targets include a Senegalese bank, a financial services company in Chile, a tax firm in Colombia, and a government economic agency in Argentina, which were hit as part of gangs\u2019 dry runs in developing countries, the data showed.<\/p>\n<p>The research comes as cyber attacks have almost doubled since before the COVID-19 pandemic, exacerbated in the developing world by rapid digitization, good Internet networks, and \u201cinadequate\u201d protection, the IMF said this month.<\/p>\n<p>Reported losses from cyber incidents to businesses worldwide since 2020 had climbed to almost $28 billion, with billions of records stolen or compromised, the IMF said, adding that total costs were likely to be \u201csubstantially higher.\u201d<\/p>\n<p>The \u201cstaging ground\u201d tactic worked because businesses in those countries had \u201cless of an awareness of cyber security,\u201d said Nadir Izrael, chief technology officer at cyber security group Armis.\u00a0 \u00a0<a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/arstechnica.com\/security\/2024\/04\/hackers-are-carrying-out-ransomware-experiments-in-developing-countries\/&amp;ct=ga&amp;cd=CAEYACoTOTQ5ODA5MDYwNDEzMDI2MjQzMzIaZjk1ZDdkNTc3NTkyZGUyMTpjb206ZW46VVM&amp;usg=AOvVaw2PWlT0ycTvHslewuZTYQQ8\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By ELLESHEVA KISSIN &#8211;\u00a0Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia, and South America before targeting richer countries that have more sophisticated security methods. Hackers have adopted a \u201cstrategy\u201d of infiltrating systems in the developing <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2024\/04\/29\/hackers-are-carrying-out-ransomware-experiments-in-developing-countries\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":77380,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1282,1281,636],"tags":[1283],"class_list":["post-77378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-cybersecurity","category-ransomware","tag-cybersecurity-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.cyberconservices.com\/wp-content\/uploads\/2024\/04\/High-resolution-imAGE-of-hacker-group-1.png","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=77378"}],"version-history":[{"count":1,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77378\/revisions"}],"predecessor-version":[{"id":77381,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77378\/revisions\/77381"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media\/77380"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=77378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=77378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=77378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}