fbpx

Cyberattacks in Latin America

The term Latin America, with its English acronym Latam, is a geographical and cultural definition coined in the nineteenth century to characterize a vast region of the American continent

It goes from the Mexican-American border to the Fire-Land in the Antarctica’s confines.

The predominant languages are derived from Latin, with Spanish and Portuguese being managed by the majority of their population.

It is a region that claims its place in the global context, emerging as an area with immense potential in the various human labor areas.

Regarding technology, although it is a step back from other continents such as Asia and Europe and

North America, a very interesting activity is presented, not only by the number of transactions derived from a population in constant ascent, but also by a technological evolution in itself, sustained by the increasing number of human talent.

,br>

The region growth has put it in the sights of those people and organizations that make productive life making attacks or incursions unpleasant in the effort of others. Specifically in the information technology field, Latin America is a very vulnerable area to be attacked by hackers.

Indeed, whether due to the legal vacuum in terms of data protection or the Latin American’s idiosyncrasies, informatics security in the region, according to many experts, is one of the worst in the world, only superior when it is compare with the African continent.

Days ago, the informatics security company Eset characterized the most common cyber-attacks types in Latin America. This classification was based on data collected by its detection products and was presented to the Informatics Security Forum in Sao Paulo, which took place last week in Brazil.

As Eset revealed, identity theft with fraudulent messages, (phishing), cyber-extortion, malicious code and crypto-mining or crypto jacking are the most common attacks that occur in Latin America. Mendoza, a Eset’s senior executive , pointed out some characteristics in each of the most frequent attacks:

Identity Impersonations

He stressed that phishing continues to be the most frequent malicious code in the region, using more elaborate procedures and tactics to trick users with fraudulent messages and impersonations, especially in the financial area.

This behavior was global, since it increased by 46 percent in the 2018 first quarter with respect to the previous one.

Malware

The malicious codes, climbed to the first places among the most common attacks in the region.

Mendoza reported, from Latin America, daily in Eset arrive 300,000 malware unique variants and about 300 new samples are for Google’s Android mobile operating system.

Ramsomware

Other cyber-attacks that are constantly increasing are cyber-rebars, also known as ramsomware. They are programs that request economic rewards to recover information that has been hijacked, Colombia being the most affected country.

Cryptojacking

Another of the most common threats in Latin America is called cryptojacking, an attack that hijacks the users’ processing resources to capture virtual currencies. In this regard, Mendoza said: «It is enough to visit a website to be affected,» who highlighted that the so-called «JS / CoinMiner», one of these crypto currency miners, has been the most world detected threat between December 2017 and June 2018.

ESET is an informatics security company based in Bratislava, Slovakia founded in 1992, after of two private companies’ merger.

These are just some of the viruses that find their place in the informatics market, but new viruses are constantly appearing and the call is to urge companies and users in general to prepare to combat these types of increasingly sophisticated threats, making use of informatics security tools which provide the necessary peace and confidence in the daily and constant internet incursions.

Cibersys, an expert in the cyber security area, offers its fully virtualized solutions, Wi-Fi Security and Virtual Firewall, which will support you in a totally secure environment configuration for your organization. We invite you to know the solutions of our Cibersys Cloud Security product family by clicking here.

Visit us at www.cibersys.com

Compartir este post

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email