{"id":458,"date":"2026-01-20T17:41:36","date_gmt":"2026-01-20T17:41:36","guid":{"rendered":"https:\/\/malaysian-business.com\/wptest\/2026\/01\/20\/alarming-increase-in-targeted-attacks-aimed-at-politically-motivated-sabotage-and-subversion\/"},"modified":"2026-01-23T18:18:24","modified_gmt":"2026-01-23T18:18:24","slug":"alarming-increase-in-targeted-attacks-aimed-at-politically-motivated-sabotage-and-subversion","status":"publish","type":"post","link":"https:\/\/malaysian-business.com\/portal\/2026\/01\/20\/alarming-increase-in-targeted-attacks-aimed-at-politically-motivated-sabotage-and-subversion\/","title":{"rendered":"Alarming Increase in Targeted Attacks Aimed at Politically Motivated Sabotage and Subversion"},"content":{"rendered":"<p>Kuala Lumpur, May 5 \u2013 According to Symantec\u2019s (Nasdaq: SYMC) Internet Security Threat Report (ISTR), Volume 22, released today, cyber criminals revealed new levels of ambition.<\/p>\n<p>\u201cNew sophistication and innovation are the nature of the threat landscape, but this year Symantec has identified seismic shifts in motivation and focus,\u201d said the Director of Systems Engineering, David Rajoo.\u00a0<\/p>\n<p>\u201cThe world saw specific nation states double down on political manipulation and straight sabotage. Meanwhile, cyber criminals caused unprecedented levels of disruption by focusing their exploits on relatively simple IT tools and cloud services,\u201d he added.<\/p>\n<p>Symantec\u2019s ISTR provides a comprehensive view of the threat landscape, including insights into global threat activity, cyber criminal trends and motivations for attackers. Key highlights include:<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Subversion and Sabotage Attacks Emerge at the Forefront<\/strong><\/span><\/p>\n<p>Cyber criminals are executing politically devastating attacks in a move to undermine a new class of targets. Cyber-attacks against the U.S. Democratic Party and the subsequent leak of stolen information reflect a trend toward criminals employing highly-publicized, overt campaigns designed to destabilize and disrupt targeted organizations and countries. While cyber-attacks involving sabotage have traditionally been quite rare, the perceived success of several campaigns \u2013 including the U.S. election and Shamoon \u2013 point to a growing trend to criminals attempting to influence politics and sow discord in other countries.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Nation States Chase the Big Scores<\/strong><\/span><\/p>\n<p>A new breed of attackers revealed major financial ambitions, which may be an exercise to help fund other covert and subversive activities. Today, the largest heists are carried out virtually, with billions of dollars stolen by cyber criminals. While some of these attacks are the work of organized criminal gangs, for the first time nation states appear to be involved as well. Symantec uncovered evidence linking North Korea to attacks on banks in Bangladesh, Vietnam, Ecuador and Poland.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Attackers Weaponize Commonly Used Software; Email Becomes the Weapon of Choice\u00a0<\/strong><\/span><\/p>\n<p>The use of email as an infection point also rose, becoming a weapon of choice for cyber criminals and a dangerous threat to users. Symantec found one in 131 emails contained a malicious link or attachment \u2013 the highest rate in five years. Further, Business Email Compromise (BEC) scams, which rely on little more than carefully composed spear-phishing emails \u2013 scammed more than three billion dollars from businesses over the last three years, targeting over 400 businesses every day.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Caving in to Digital Extortion: Americans Most Likely to Pay Ransom Demands<\/strong><\/span><\/p>\n<p>Ransomware continued to escalate as a global problem and a lucrative business for criminals. Symantec identified over 100 new malware families released into the wild, more than triple the amount seen previously, and a 36 percent increase in ransomware attacks worldwide.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Cracks in the Cloud: The Next Frontier for Cyber Crime is Upon Us<\/strong><\/span><\/p>\n<p>A growing reliance on cloud services has left organizations open to attacks. Tens of thousands of cloud databases from a single provider were hijacked and held for ransom in 2016 after users left outdated databases open on the internet without authentication turned on.<\/p>\n<p><strong>From the Experts: Security Tips and Tricks<\/strong><\/p>\n<p>As attackers evolve, there are many steps businesses and consumers can take to protect themselves. As a starting point, Symantec recommends the following best practices:<\/p>\n<p>For Businesses:<\/p>\n<p>\u2022 <strong>Don\u2019t get caught flat-footed:<\/strong> Use advanced threat intelligence solutions to help you find indicators of compromise and respond faster to incidents.<\/p>\n<p>\u2022 <strong>Prepare for the worst:<\/strong> Incident management ensures your security framework is optimized, measureable and repeatable, and that lessons learned improve your security posture. Consider adding a retainer with a third-party expert to help manage crises.<\/p>\n<p>\u2022 <strong>Implement a multi-layered defense:<\/strong> Implement a multi-layered defense strategy that addresses attack vectors at the gateway, mail server and endpoint. This also should include two-factor authentication, intrusion detection or protection systems (IPS), website vulnerability malware protection, and web security gateway solutions throughout the network.<\/p>\n<p>\u2022 <strong>Provide ongoing training about malicious email:<\/strong> Educate employees on the dangers posed by spear-phishing emails and other malicious email attacks, including where to internally report such attempts.<\/p>\n<p>\u2022<strong> Monitor your resources:<\/strong> Make sure to monitor your resources and networks for abnormal and suspicious behavior, and correlate it with threat intelligence from experts.<\/p>\n<p>For Consumers:<\/p>\n<p>\u2022 <strong>Change the default passwords on your devices and services:<\/strong> Use strong and unique passwords for computers, IoT devices and Wi-Fi networks. Don\u2019t use common or easily guessable passwords such as \u201c123456\u201d or \u201cpassword\u201d.<\/p>\n<p>\u2022 <strong>Keep your operating system and software up to date:<\/strong> Software updates will frequently include patches for newly discovered security vulnerabilities that could be exploited by attackers.<\/p>\n<p>\u2022 <strong>Be extra careful on email:<\/strong> Email is one of the top infection methods. Delete any suspicious-looking email you receive, especially if they contain links and\/or attachments. Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.<\/p>\n<p>\u2022 <strong>Back up your files:<\/strong> Backing up your data is the single most effective way of combating a ransomware infection. Attackers can have leverage over their victims by encrypting their files and leaving them inaccessible. If you have backup copies, you can restore your files once the infection has been cleaned up.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kuala Lumpur, May 5 \u2013 According to Symantec\u2019s (Nasdaq: SYMC) Internet Security Threat Report (ISTR), Volume 22, released today, cyber criminals revealed new levels of ambition. \u201cNew sophistication and innovation are the nature of the threat landscape, but this year Symantec has identified seismic shifts in motivation and focus,\u201d said the Director of Systems Engineering, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":["post-458","post","type-post","status-publish","format-standard","hentry","category-features"],"_links":{"self":[{"href":"https:\/\/malaysian-business.com\/portal\/wp-json\/wp\/v2\/posts\/458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/malaysian-business.com\/portal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/malaysian-business.com\/portal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/malaysian-business.com\/portal\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/malaysian-business.com\/portal\/wp-json\/wp\/v2\/comments?post=458"}],"version-history":[{"count":1,"href":"https:\/\/malaysian-business.com\/portal\/wp-json\/wp\/v2\/posts\/458\/revisions"}],"predecessor-version":[{"id":5969,"href":"https:\/\/malaysian-business.com\/portal\/wp-json\/wp\/v2\/posts\/458\/revisions\/5969"}],"wp:attachment":[{"href":"https:\/\/malaysian-business.com\/portal\/wp-json\/wp\/v2\/media?parent=458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/malaysian-business.com\/portal\/wp-json\/wp\/v2\/categories?post=458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/malaysian-business.com\/portal\/wp-json\/wp\/v2\/tags?post=458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}