According to Microsoft’s annual Digital Defense report, cybercriminals are targeting major government healthcare, educational and commercial organizations to spy on their networks or people for attacks with topics such as COVID.
Microsoft blocked more than 1300 million malicious and suspicious mails in 2019, of which more than 100 crore were credential attack mails. The tech giant was busy handling misinformation related to COVID-19 in 2020, as cybercriminals continuously click on malicious links and attachments to users to mimic credible sources such as the World Health Organization (WHO) and other national health organizations. Were lured by According to Microsoft’s annual Digital Defense report, cybercriminals are targeting major government healthcare, educational and commercial organizations to spy on their networks or people for attacks with topics such as COVID.
The report said that 90 percent of state and state notifications have been sent last year to organizations that do not operate critical infrastructure, including non-governmental organizations (NGOs), advocacy groups, human rights organizations, and think tanks. Huh. China, America and Russia were the worst affected, but every country in the world faced at least one COVID-19 theme attack. The report found that there has been a rapid increase in such malicious mates over the past year, which is why they use techniques that make them harder to catch. The safest targets are also at risk due to these techniques.
The data was collected from more than 120 million PCs, servers and Internet of Things (IoT) devices, with access to Microsoft services, as well as 63,000 crore authentication events, 47,000 million emails for threats, and more than 18 million URL scans were done. Cyber Criminal is opportunistic and has capitalized on the interest and fear related to the COVID-19 pandemic and other disruptive events, said Mary Jo Shred, Assistant General Counsel at Asia’s Microsoft Digital Crime Unit.
He further said, in view of his ransomware activities, he has also targeted those institutions which cannot function offline or without records during the epidemic, such as hospitals or medical research institutes. Microsoft’s Digital Crime Unit has collaborated with law enforcement and other partners on 22 malware disruptions since 2010, resulting in more than 500 million devices from cybercriminals.