Expense to essential: The strategic value of cybersecurity in the digital age

Malaysia Cyber Threat Intelligence Report 2023
  • Blog
  • 10 minute read
  • 18/07/24
Authors
Alex Cheng

Alex Cheng

Director, Cyber Threat Operations, PwC Malaysia

Jacky Low

Jacky Low

Senior Associate, Cyber Threat Operations, PwC Malaysia

As the global cyber threat landscape becomes increasingly complex, Malaysia continues to face substantial security challenges. Our latest global threat intelligence outlines critical challenges facing the region and locally, including ransomware, zero-day vulnerabilities and cyber threats stemming from geopolitical tensions. These threats contribute to widespread misinformation, reputational damage and operational disruptions for Malaysian organisations.

The urgency of these issues is aligned with findings from the World Economic Forum's 2024 Global Risk Report, which ranks cybersecurity as the fourth most critical global risk over a two-year period. Additionally, CyberSecurity Malaysia (CSM) reported a concerning 4,741 cyber threats in 2022, with 456 fraud cases noted by early 2023 alone.

This blog highlights the key trends of cyber attacks and the importance of recognising cybersecurity not merely as an expenditure, but as a strategic investment essential for digital transformation and organisational resilience. By proactively investing in cybersecurity now, organisations can protect themselves against cyber threats that could potentially incur greater costs in the future and safeguard vital assets in the face of evolving digital threats.

Key trends

Ransomware

In 2023, Malaysia faced a significant rise in ransomware attacks with incidents doubling from the previous year, highlighting that attackers are continually developing new techniques to circumvent increasingly innovative cybersecurity technologies. Advanced functionalities such as data infiltration, deployment of additional malware delivery systems and business email compromise can critically cripple an organisation’s system. 

While a report from CSM indicated that 85.2% of ransomware in Malaysia involved the exfiltration and exposure of victim companies’ data, a survey by IDC and Fortinet, which involved 550 IT leaders across Asia Pacific, identified phishing as a primary method for cyber attacks. Looking closer to home, data from Kaspersky found that Malaysia ranked top three amongst its Southeast Asian peers in terms of phishing incidents.

Recent trends reveal how phishing is linked to more complex schemes like Ransomware-as-a-Service (RaaS) which involves initial access brokers (IAB). This connection forms a complex ecosystem where simple phishing is just the beginning, leading to the development of advanced strategies that use unauthorised access to launch large-scale ransomware attacks through these available services.

IAB and RaaS: A multi-tiered partnership

IAB and RaaS providers simplify the process for threat actors, including those with minimal technical knowledge, to deploy ransomware against targets. This streamlined approach not only enhances the efficiency of ransomware attacks but also significantly broadens their reach and impact, illustrating how rapidly and extensively ransomware can spread on a large scale.

The ransomware group known as LockBit has been linked to 14 instances of data breaches affecting various sectors in Malaysia, including industry, education and healthcare. LockBit operates as an affiliate-based RaaS and employs a wide variety of tactics, techniques and procedures, creating significant challenges for defence and mitigation. LockBit ransomware compromises victim networks through a variety of techniques, such as purchased access, unpatched vulnerabilities, insider access and zero-day exploits. An attack by LockBit led to operational disruptions with essential functions coming to a sudden halt, extortion by hackers for financial gain and data theft, followed by illegal publication used as blackmail if the victim does not comply.

These incidents highlight LockBit's suspected use of the dark web, which functions as a critical marketplace for acquiring access credentials via IABs and malicious software through RaaS providers. This pattern underscores how cybercriminals leverage these underground networks to enhance the reach and impact of their attacks, posing significant security challenges across multiple industries.

Zero-day exploits

Zero-day exploits occur when cybercriminals swiftly take advantage of newly discovered software vulnerabilities before developers can release a patch. Cybercriminals often target widely used applications, understanding that their widespread distribution makes it challenging to deploy timely fixes to all systems. As Malaysia uses many of the same applications as other countries worldwide, it is not immune to these threats.

One such notable incident was the MOVEit attack in 2023. This undisclosed software vulnerability was exploited to infiltrate systems across various regions, including a major insurance provider in Malaysia. The attack led to substantial breaches of personal identifiable information (PII) and access to other confidential data.

The ransomware group known as Clop was identified to be responsible for exploiting an SQL injection vulnerability in MOVEit Transfer web applications. This exploit involved installing the LEMURLOOT web shell which allowed the attackers to access and manipulate the SQL database structure, access system settings, manage files, and even create accounts with administrative privileges.

With administrative access established, attackers could further exploit a .NET vulnerability to achieve remote command execution. This allowed them to submit malicious payloads to MOVEit Transfer application endpoints, leading to potential modification and unauthorised disclosure of database contents. Over the course of ten days, more than 130 entities using the MOVEit platform for secure file transfers were compromised. The Clop ransomware group further escalated the situation by threatening to release the stolen files unless a ransom was paid.

Cyber activity surrounding geopolitical conflicts

Cybersecurity and geopolitical conflicts: separately, they are among the top worries of business leaders. Together, the combined risks pose an even bigger challenge that demands immediate action. Our latest global threat intelligence indicates that cyber activity surrounding conflicts have significantly intensified. This includes bolder attacks from hacking groups such as NoName057, a pro-Russian hacker group that carried out ‘Distributed Denial-of-Service’ (DDoS) attacks since March 2022. The question we should be asking ourselves: Is Malaysia ready to mitigate escalating cyber risks related to geopolitical tensions?

Amid these developments, it's crucial to note Malaysia's significant exposure to conflict-based cyber threats. The country has become a target, especially in sectors related to engineering, natural gas extraction, and exports like the Kasawari Gas Project. These attacks are part of broader state-sponsored espionage efforts, showcasing advanced technical capabilities and a strategic focus on sectors tied to regional geopolitical events.

This persistent threat landscape requires organisations in Malaysia to be equipped with a fortified cybersecurity posture. 

Nations and corporations within Asia Pacific such as Malaysia must prioritise the establishment of robust cybersecurity frameworks, enhance threat detection capabilities and foster collaborative international security efforts.

Malaysia’s Cyber Security Bill 2024 (‘the Bill’) was introduced for its first reading in the Parliament on 25 March 2024. Designed to establish a regulatory framework that enhances the protection of the country’s cybersecurity environment, it represents a milestone in safeguarding Malaysia’s cybersecurity landscape.

The Bill introduces enhanced standards and spells out responsibilities through distinctive new roles such as the Chief Executive and the National Critical Information Infrastructure (NCII) sector lead for more industry-specific focus on cybersecurity governance in Malaysia. Moving forward, it will be essential to keep a close watch on the enactment and influence of this law to ensure it meets the challenges posed by the ever-changing nature of cyber threats.

What can Malaysian organisations do?

In response to the increasingly sophisticated cyber threat landscape, organisations should adopt a fortified cyber infrastructure by deploying layered security solutions consisting of firewalls, intrusion detection systems, intrusion prevention systems and endpoint protection along with diligent patch management and regular updates to safeguard against vulnerabilities, particularly zero-day exploits. Below are tactics beyond hardware and software defences organisations should consider.

Our recommendations

Performing security monitoring allows organisations to continuously monitor and swiftly detect, analyse and respond to potential cyber attacks. A Security Operations Centre (SOC), whether managed or outsourced services for example, utilises advanced security measures and leverages real-time data to protect against emerging threats, fortifying an organisation's defences.

Regular security audits and penetration testing are indispensable for maintaining a sound cybersecurity posture. These evaluations help identify flaws and potential vulnerabilities within an organisation's systems that could be exploited by attackers and assess the effectiveness of existing security measures. By regularly testing cybersecurity defences, informed adjustments can be made accordingly to enhance security protocols.

Aligning cybersecurity measures with recognised frameworks such as the NIST Cybersecurity Framework and ISO/IEC 27001 ensures that an organisation's practices are both standardised and optimised. By following these established guidelines, organisations will meet industry standards and incorporate the latest best practices.

Conducting regular phishing assessments is essential to gauge employees' awareness and preparedness considering that phishing is a predominant method of attack. These assessments help identify areas where additional training is necessary to enhance their ability to recognise and respond to phishing attempts.

Engaging in cyber drills or crisis simulations across various organisational levels tests the readiness and decision-making capabilities in a controlled and risk-free environment. These exercises are vital for identifying gaps in an organisation’s response plan and refining strategies to ensure effective action during actual cyber incidents.

Dark web and deep web brand monitoring finds mentions of brands and executives, as well as threats like stolen personal information, card data, emails, phishing kits and fraud tools targeting organisations. It also detects brokers selling illegal access to corporate networks. This early detection is crucial for organisations to respond quickly to and mitigate potential threats, protecting their data and reputation.

Picture of woman's backside in the dark lab

Staying current with the latest developments in threat intelligence is equally important. Subscribing to reputable threat intelligence platforms allows organisations to gain insights into the latest tactics, techniques and procedures used by cybercriminals. This knowledge is crucial for pre-emptively addressing threats and adapting your security measures to the evolving landscape. For more information about our threat intelligence service offerings, visit our Marketplace.


Did you find this blog helpful? Yes | No

Follow us

Required fields are marked with an asterisk(*)

By submitting your email address, you acknowledge that you have read the Privacy Statement and that you consent to our processing data in accordance with the Privacy Statement (including international transfers). If you change your mind at any time about wishing to receive the information from us, you can send us an email message using the Contact Us page.

Contact us

Clarence Chan

Clarence Chan

Partner, Digital Trust and Cybersecurity Leader, PwC Malaysia

Tel: +60 (3) 2173 0344

Alex Cheng

Alex Cheng

Director, Cyber Threat Operations, PwC Malaysia

Tel: +60 (3) 2173 0647

Tanvinder Singh

Tanvinder Singh

Director, Cyber and Forensics, PwC Malaysia

Tel: +60 (3) 2173 0293

Hide