Akamai report: Financial services industry in Asia Pacific and Japan suffered more than 3.7 billion attacks, still the most attacked industry
As financial institutions in Asia Pacific and Japan expand and accelerate digital innovation, the number of web application and API attacks against these institutions increased by 36%
October 11, 2023 – Akamai Technologies, Inc. (hereinafter referred to as: Akamai), a cloud service provider responsible for supporting and protecting online life, recently released a new issue of the "State of the Internet" report. The title is “Innovation at High Risk: Attack Trends in the Financial Services Industry.” The report highlights the following: The financial services industry in Asia Pacific and Japan remains one of the most attacked industries globally , with the number of web application and API attacks increasing by 36% between Q2 2022 and Q2 2023. %, with a total of more than 3.7 billion times. In addition, the report also found that local file inclusion (LFI) remains the most dominant attack vector, and 92.3% of attacks against the financial industry in Asia Pacific and Japan targeted banks, posing a serious threat to financial institutions and their customers. Huge threat.
As financial services companies in Asia Pacific and Japan open up more channels and provide better customer experiences, they are using more and more third-party scripts, accounting for 40% of the total scripts used. These data points illustrate that as businesses, especially banks and consumer-focused institutions, continue to expand their digital footprints to reach more customers and gain a competitive advantage, they face serious risks.
Reuben Koh, director of security technology and strategy for Asia Pacific and Japan at Akamai, said: "The financial services industry in Asia Pacific and Japan is one of the most innovative and competitive industries in the world. Financial institutions are increasingly turning to third-party scripts , in order to quickly add new products, features and interactive experiences to customers. However, companies often have limited monitoring capabilities and cannot identify the authenticity of these scripts and whether there are potential vulnerabilities, thus creating another layer of risk for the company. "With limited detection capabilities for risky third-party scripts, attackers now have another vector to exploit against banks and their customers."
Akamai's report also found that malicious bot traffic in Asia Pacific and Japan has increased by 128% since 2022, highlighting the continued attacks on customers and their data in the financial services industry. Cybercriminals use bots to increase the scale, efficiency and effectiveness of their attacks. Globally, the Asia-Pacific region and Japan are the second largest attack target regions for malicious bot requests targeting the financial services industry, accounting for 39.7% of all malicious bot requests worldwide. Use cases include scraping website content to impersonate a website branded in the financial services industry to conduct phishing scams, and conducting credential stuffing attacks by automatically injecting stolen usernames and passwords to achieve account takeovers. This shows that attackers are constantly evolving their techniques and are beginning to focus on attacking financial services consumers to gain the greatest return on investment.
Other key findings from the report include:
● Web applications and APIs continue to be the preferred attack vector for attackers in Asia Pacific and Japan. The financial industry accounts for 50% of such attacks, followed by business (19.99%) and social media (8.3 %).
● Australia, Singapore and Japan are the three most attacked countries in the APJ region, accounting for more than three-quarters of all web application and API attacks. As global financial centers, it is no surprise that businesses in these countries continue to be targeted by large-scale targeted attacks.
● Local file inclusion (LFI) is still the main attack vector, accounting for 63.2% of all attacks, while cross-site scripting (XSS) and PHP injection (PHPi) are ranked second and third, accounting for 21.3% respectively. % and 6.32%. In an LFI attack, an attacker exploits insecure coding practices or actual vulnerabilities on a web server to remotely execute code or access locally stored sensitive information. For example, older PHP-based web servers are more vulnerable to LFI attacks because of existing methods that bypass their input filters.
● Companies in the financial services industry in Asia Pacific and Japan must continue to be aware of additional regulatory oversight and new reporting obligations. For example, the increasing use of third-party scripts may make it difficult for financial institutions to comply with the requirements of the upcoming Payment Card Industry Data Security Standard (PCI DSS) v4.0, which will include client-side script monitoring capabilities and management Relevant specific content. Regulators are likely to increasingly enforce new regulations, so businesses must ensure they take these new compliance requirements into account or risk fines or reputational damage.
Koh said: “Financial services companies in Asia Pacific and Japan must remember that as the pace of innovation in the industry accelerates, cybercriminals are always trying to find new and more sophisticated ways to launch cyber attacks. Financial services aggregators and those who The growing number of businesses eager to adopt open banking practices means that future growth in the industry will be even more reliant on the use of APIs and third-party scripts, which will lead to a further expansion of the attack surface."
He concluded: “Financial institutions must focus on protecting new digital products, continuously educate customers on cybersecurity best practices, and invest in smooth user-facing security measures. As regulators implement various policies to strengthen Cybersecurity standards, financial services businesses must also understand and consider new compliance requirements while strengthening their security posture and cyber resilience against modern cyber threats.”
Previous article:Synopsys: Working together to build trustworthy software
Next article:Synopsys explains key factors for successful AppSec program
- Popular Resources
- Popular amplifiers
- e-Network Community and NXP launch Smart Space Building Automation Challenge
- The Internet of Things helps electric vehicle charging facilities move into the future
- Nordic Semiconductor Launches nRF54L15, nRF54L10 and nRF54L05 Next Generation Wireless SoCs
- Face detection based on camera capture video in OPENCV - Mir NXP i.MX93 development board
- The UK tests drones equipped with nervous systems: no need to frequently land for inspection
- The power of ultra-wideband: reshaping the automotive, mobile and industrial IoT experience
- STMicroelectronics launches highly adaptable and easy-to-connect dual-radio IoT module for metering and asset tracking applications
- This year, the number of IoT connections in my country is expected to exceed 3 billion
- Infineon Technologies SECORA™ Pay Bio Enhances Convenience and Trust in Contactless Biometric Payments
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Huawei's Strategic Department Director Gai Gang: The cumulative installed base of open source Euler operating system exceeds 10 million sets
- Download from the Internet--ARM Getting Started Notes
- Learn ARM development(22)
- Learn ARM development(21)
- Learn ARM development(20)
- Learn ARM development(19)
- Learn ARM development(14)
- Learn ARM development(15)
- Analysis of the application of several common contact parts in high-voltage connectors of new energy vehicles
- Wiring harness durability test and contact voltage drop test method
- How to solve the motor efficiency and temperature rise problems caused by motor controllers
- MY-8188EUS Linux-3.14.52 Test
- MSP430 MCU Development Record (12)
- [The answer has been announced] "I draw and you guess" and become a happy big kid!
- How to find the pspise simulation model of pt1000 thermistor? ? Help!!
- [Review SGP40] Intelligent ambient air quality tracking model #5 A board suitable for edge computing of sensors
- Several key points of TI's official two-phase LLC interleaving parallel procedure (to be continued)
- Python Qt GUI Quick Programming——PyQt Programming Guide
- Why does an RC filter circuit need a resistor? Can't a capacitor filter be used without a resistor?
- Program call problem