Thursday January 23, 2020
Home India Heavy Cyber A...

Heavy Cyber Attacks From Russia, US, China In India

These honeypots are developed to deceive even elite hackers and appear to be serving a specific purpose or organisation.

0
//
cloudhopper,cyber attacks
A man holds a laptop computer as cyber code is projected on him in this illustration picture. VOA

India has been the target of over 4.3 lakh cyber attacks from five countries including China, Russia and the US while more than 73,000 attacks were initiated from India between January and June this year, says a Finnish cybersecurity company.

According to F-Secure’s honeypot data, Russia, the US, China, the Netherlands and Germany targeted India with 436,090 attacks. This is nearly 12 times more than which originated from India.

Honeypots are basically decoy servers that emulate the real IT environment of a business enterprise.

cyber attacks
Due to its nature, the chip is physically unclonable and can, thus, render the device invulnerable to hijacking, counterfeiting or replication by cyber-criminals. Pixabay

Russia accounted for most cyber attacks on India (255,589), followed by the US (103,458), China (42,544), the Netherlands (19,169) and 15,330 attacks from Germany.

On the other hand, the top five countries that were targeted by Indian cyber attackers were Austria, the Netherlands, the UK, Japan, and Ukraine — a total of 36,563.

F-Secure gave the break-up: Austria (12,540), the Netherlands (9,267), the UK (6,347), Japan (4,701) and 3,708 attacks targeted Ukraine’s businesses.

“The relatively higher number of inbound attacks on Indian honeypots reflects how the fast-digitising country is becoming more lucrative for global cyber criminals,” Leszek Tasiemski, Vice President of cyber security products R&D at F-Secure, said in a statement on Sunday.

Cryptocurrency, cyber attacks
Experts: Cyber attacks Growing Increasingly Sophisticated. Pixabay

“We are gathering and analysing all the pertinent data to ensure that our customers stay protected given the dynamically evolving threat landscape,” he added.

To track these cyber attacks, F-Secure has deployed 41 honeypots across the globe.

“Our public honeypots are a valuable source of threat intelligence and an integral part of the infrastructure that powers our various security offerings, including our Rapid Detection and Response Service,” Tasiemski said.

Honeypots are set up explicitly to grab attention of attackers. They are used to gain critical insights on attack types, popular targets, sources, volume and TTPs (Tactics, Techniques and Procedures).

Such insights are collected by deliberately allowing potential attackers to gain unauthorized access to the emulated services of a server and then studying the attack path to the point that the attacker realizes it is a honeypot, F-secure said.

Also Read: U.S. Government Warns People Against China-Linked Hacking Group

These honeypots are developed to deceive even elite hackers and appear to be serving a specific purpose or organisation.

They enable F-Secure to collect the latest malware samples or shell scripts and new hacking techniques.

The research data is then processed to further benefit F-Secure customers via product enhancements and threat intelligence reports. (IANS)

Next Story

Snake is the Most Probable Wildlife Animal Reservoir of Novel Coronavirus: Study

Snake was one of the animals being sold in Wuhan's Huanan Seafood Wholesale Market before its closure.

0
virus Snake
Snake is the most probable wildlife animal reservoir for the novel coronavirus that had caused 17 deaths in central China's Hubei Province. (Representational Image). Pixabay

A study published on Wednesday in the Journal of Medical Virology showed that snake is the most probable wildlife animal reservoir for the novel coronavirus that had caused 17 deaths in central China’s Hubei Province.

Scientists from Peking University Health Science Center School of Basic Medical Sciences, the First affiliated Hospital of Guangxi University of Chinese Medicine, Ruikang Hospital Affiliated to Guangxi University of Chinese Medicine, Ningbo University’s School of Medicine, and Wuhan University of Bioengineering carried out a comprehensive analysis on the existing sequences of the newly identified coronavirus, the Xinhua news agency reported.

They used a method called “relative synonymous codon usage” (RSCU) bias to compare RNA sequences of different animal species.

Snake was one of the animals being sold in Wuhan’s Huanan Seafood Wholesale Market before its closure. The market is believed to be related to most of the infected cases.

Snake
Snake was one of the animals being sold in Wuhan’s Huanan Seafood Wholesale Market before its closure. The market is believed to be related to most of the infected cases. Pixabay

Results obtained from the analyses suggested that the new virus 2019-nCoV appeared to be a recombinant virus between the bat coronavirus and an origin-unknown coronavirus.

The recombination occurred within the viral spike glycoprotein, which recognizes cell surface receptor. Additionally, their findings suggested that snake is the most probable wildlife animal reservoir for the 2019-nCoV based on its RSCU bias resembling snake compared to other animals.

Taken together, the research results suggested that homologous recombination within the spike glycoprotein may contribute to cross-species transmission from snake to humans.

Also Read- New Locust Swarms Threaten Agriculture in Ethiopia

Glycoprotein is a group of conjugated proteins containing small amounts of carbohydrates.

Chinese health authorities have posted the full genome of 2019-nCoV in the genetic sequence database of U.S. National Institutes of Health and the Global Initiative on Sharing All Influenza Data, according to U.S. Centers for Disease Control and Prevention (CDC). (IANS)