MANILA, Philippines – Anonymized data voluntarily provided by Kaspersky customers showed that seven in 10 (68.95%) phishing attempts targeted finance-related transactions in the Philippines from February to April this year. This is the highest percentage of phishing attempts in Southeast Asia.
The cybersecurity company detected and blocked phishing attacks against three financial categories namely, banks, e-commerce stores and payment systems.
Statistics from Kaspersky Security Network (KSN) revealed that phishing attempts in the Philippines is higher than in Indonesia (65.90%), Singapore (55.67%), Thailand (55.63%), Malaysia (50.58%), and Vietnam (36.12%).
In all three finance categories during the same three-month period, Kaspersky data showed that there were one in two (58.50%) phishing attempts against payment systems in the country such as credit cards, debit cards, and mobile payment apps or e-wallets. This number is the highest among countries in SEA.
On the other hand, the same data also showed that phishing attempts in local banks was the lowest in the region at only 2.17%, while phishing attempts versus e-commerce shops in the country was the second lowest among SEA countries at 8.28%.
The percentages are from anonymized data based on the triggering of the deterministic component in Kaspersky’s Anti-Phishing system on user computers. The component detects all pages with phishing content that the user has tried to open by following a link in an e-mail message or on the web, as long as links to these pages are present in the Kaspersky database.
“Alongside the increased adoption in digital transactions here in Southeast Asia, we also see the rise of ‘Super Apps’ in the region. These are the mobile applications that combine all popular monetary functions including e-banking, mobile wallets, online shopping, insurance, travel bookings, and even investments. Putting our data and digital money in one basket can trigger an aftermath snowball, with the impact of a phishing attack swelling at an unforeseeable rate,” says Yeo Siang Tiong, General Manager for Southeast Asia at Kaspersky.
Super Apps are traditional banks and service providers’ way of standing out in a rather crowded industry. As they try to work with third parties and incorporate their services into a single mobile app, the attack surface expands, opening up more doors to a malicious exploit.
Phishing has remained to be the most effective trick on cybercriminals’ sleeves. It is a known way to crack into a user’s or even a company’s network by playing on a user’s emotions.
A possible scenario is given that one app has all the financial details of a user, a simple phishing link asking for the user’s credentials can compromise all the data available in the app. This magnifies the possible damaging effects of this threat.
“It is known that cybercriminals follow the money trail, so it is important for banks, app developers, and service providers to integrate cybersecurity from the beginning of application development. We expect hackers to target the rising Super Apps, both its infrastructure and its users through social engineering attacks. We urge all fintech companies to deploy a secure-by-design approach in their systems and to continuously provide proactive education for their users in this period where phishing attacks continue to thrive,” adds Yeo.
While security systems are in place in most financial companies to protect customers from falling victim to suspicious activities, it is true that prevention is better than cure; much more can be proactively done at both the individual and bank level.
For enterprises, the most important method of protection is to keep in mind that cybersecurity should be a “living” strategy, not a static platform. This will blend technology and effort, and is constantly upgraded, updated and improved.
Banks and service providers need to ensure a security team (or security experts) that will be able to ensure cyber defense infrastructure is updated, and will be able to provide support in the event of a cyber attack.
To start, firms can invest in endpoint security solutions. Kaspersky currently offers its Endpoint Detection and Response Optimum at a 35% discount to help enterprises get started. Interested companies can visit this link to know more.
Some more crucial steps to look into also include:
- Considering a threat intelligence platform. Another key component to include would be to ensure access to the latest IT security trends/threats – that is also known as threat intelligence. Threat intelligence will give the insight to act on, and paint a bigger, more accurate picture of the bank’s digital presence, to educate senior stakeholders about the ongoing risks and vulnerabilities. This will empower them to be able to make informed decisions on what needs to be done to keep the potential harm at bay, refine existing security processes to better defend against known threats and to plug any gap in the IT infrastructure on an ongoing basis.
- Ensuring any third party vendors’ cybersecurity systems are also updated. There have been increasing reports on how breaches to third-party security systems have implicated businesses. Whether you are the bank, the Government or a private enterprise, no one is immune from these security threats, and it is important that we heighten our vigilance when it comes to cybersecurity. It does not matter how secure your third-party vendor tells you their systems are, as the elevated prominence of supply chain attacks have shown us that it is important to take responsibility for your own cybersecurity posture rather than leaving it in your partners’ hands.
- As parties are impersonated by threat actors, the implementation of defense measures need to go beyond protecting their systems. Banks need to take proactive measures to remind their customers against falling prey to their impersonators and their phishing and scam attacks, even if they happen outside of their systems.
Some things to keep in mind that can help individuals protect themselves against phishing attacks include:
- Not responding. Even prompts to reply like texting “UNSUBSCRIBE” or “STOP” can be a trick to identify active phone numbers. Attackers depend on your curiosity or anxiety over the situation at hand, but you can choose not to engage.
- Avoiding using any links or contact information in the email or message. Go directly to contact channels where possible. Remember that urgent notices can be verified directly on online accounts or via an official phone helpline.
- Looking out for mistakes, typos and strange characters in the text. Some threat actors really struggle with English, or some mistakes are intentionally made (such as using numbers to replace certain alphabets, eg “Bank L0an” instead of “Bank Loan”) in an attempt to bypass spam filters.
- Slowing down if a message is urgent. Emails and SMS are often read on the go, when one is distracted or in a hurry, leaving one’s guard down. Approach offers as caution signs of possible phishing, remain calm and proceed carefully.
- Downloading an anti-malware app, which can protect against malicious apps such as Kaspersky Total Security for a safety net.
Read Kaspersky’s full 2021 Threat Landscape Report for Southeast Asia here https://kasperskysea.co/premium_report.