DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

India Ranks Second Globally in Encrypted Cyberattacks: Zscaler

DigitalCIO Bureau by DigitalCIO Bureau
December 13, 2024
in Tech News
0
Report Finds a 400% Increase in IoT and OT Malware Attacks
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Zscaler, Inc. published its Zscaler ThreatLabz 2024 Encrypted Attacks Report, which explores the latest threats blocked by the Zscaler security cloud and provides critical insights into how encryption has become a conduit for more sophisticated threats, further compounded by the rise of artificial intelligence (AI). The findings suggest that India registered 5.2 billion, the second-highest number of encrypted attacks globally, preceded by the U.S. (11 billion) – surpassing countries like France (854 million), the UK (741 million), and Australia (672 million).

ThreatLabz found that over 87% of all threats were delivered over encrypted channels between October 2023 and September 2024—a 10% increase year-over-year. The report offers strategies and best practices to help organisations tackle these covert threats.

“The rise in encrypted attacks is a real concern as a significant share of threats are now delivered over HTTPS,” said Deepen Desai, Chief Security Officer, Zscaler. “With threat actors focused on exploiting encrypted channels to deliver advanced threats and exfiltrate data, organisations must implement a zero-trust architecture with TLS/SSL inspection at scale. This approach helps to ensure that threats are detected and blocked effectively, while safeguarding data without compromising performance.”

Encrypted malware continues to dominate

Malware accounted for 86% of encrypted attacks, totaling 27.8 billion hits—a 19% year-over-year increase. Encrypted malware includes malicious web content, malware payloads, macro-based malware, etc. This growing prevalence of malware reflects a strategic shift by attackers adapting tactics to thrive within encrypted traffic, using encryption to conceal malicious payloads and content.

According to ThreatLabz researchers, the most active malware families globally were – AsyncRAT, Choziosi Loader/ChromeLoader, AMOS/Atomic Stealer, Ducktail, Agent Tesla and Koi Loader.

The report highlights significant year-over-year increases in web-based attacks, including a 79.39% surge in cross-site scripting and a 172.81% increase in browser exploit attacks. Malware, phishing and ad spyware sites topped the list for India, with malwares accounting for nearly 97% of all encrypted threats observed. Interestingly, cryptomining/cryptojacking saw a slight decline of 8.67%, while phishing attacks decreased by 3.80%. These trends may reflect the evolving tactics of threat actors, potentially fueled by the growing use of generative AI technologies by threat actors.

Most targeted industry verticals

In India, manufacturing was the most-targeted industry, experiencing a dramatic 170.88% year-on-year increase in encrypted attacks. This surge is likely fueled by rapid advancements in Industry 4.0 and the integration of interconnected systems, which have expanded the attack surface. The technology & communication sector was the second-most targeted, accounting for 32.6% of the encrypted attacks. Other heavily impacted industries included finance & insurance and retail & wholesale, showcasing the diverse range of sectors under threat in India.

“As India’s digital landscape expands, so does the threat landscape. The report highlighting 5.4 billion encrypted attacks serves as a stark reminder that cybercriminals are relentless”, said Suvabrata Sinha, CISO-in-Residence, India at Zscaler. “As we enter 2025, to protect our digital assets, we must adopt a Zero Trust approach, inspecting 100% of traffic to protect users and organisations from threats concealed within encrypted channels. We can build a more secure digital India by investing in robust security measures and empowering our workforce with cybersecurity awareness.”

Stopping encrypted attacks with zero trust

Understanding how zero trust disrupts encrypted threats requires looking at a typical attack sequence. Advanced attacks often unfold in four stages:

  1. First, attackers conduct reconnaissance to find a way into the targeted network.
  2. Next, they breach the network, often via exploits, brute-force attacks or stolen credentials.
  3. Once inside, they move laterally, escalate privileges and establish persistence.
  4. Finally, they carry out their objectives, typically conducting data exfiltration to extract valuable information that can be leveraged for further extortion or attacks.

The Zscaler Zero Trust Exchange platform provides security controls at each stage to mitigate risk and stop encrypted threats.

Organizations can bolster their ability to protect their devices, apps and data from encrypted attacks by following these recommendations:

  • Understand that any internet-facing service can be found and attacked or abused
  •  Inspect incoming encrypted traffic to detect and block threats
  • Use a zero-trust architecture to secure all connectivity holistically between users and applications, between devices like IoT and OT systems, between all locations and branch offices, between cloud workloads and more.
  • Implement microsegmentation to reduce access, even for authenticated users.
  • Leverage an AI-driven cloud sandbox to isolate and quarantine unknown attacks and stop patient-zero malware before it touches users.
  • Reduce the number of entry points into an environment.
  • Inspect outgoing northbound traffic along with incoming southbound traffic to disrupt C2 communications and protect sensitive data.
Tags: Zscaler
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Largest Global Data Breach: Comment From Bernard Montel, Technical Director And Security Strategist At Tenable

by DigitalCIO Bureau
June 25, 2025
0
Largest Global Data Breach: Comment From Bernard Montel, Technical Director And Security Strategist At Tenable

"Firstly, this is not a new data breach. It’s the result of threat actors’ use of infostealer malware that has silently scraped usernames and passwords during breaches. This...

Read moreDetails

Ascendion Acquires Product Strategy & Transformation Firm Moodys

by DigitalCIO Bureau
June 25, 2025
0
Ascendion Leads The Charge in Generative AI

Ascendion has announced the acquisition of Moodys Northwest Consulting (Moodys), a premier product strategy and transformation firm. The move strengthens Ascendion's ability to help enterprise clients imagine, build,...

Read moreDetails

AuthBridge Unveils GroundCheck.ai for Smarter CPV

by DigitalCIO Bureau
June 25, 2025
0
AuthBridge Unveils GroundCheck.ai for Smarter CPV

AuthBridge, India's leading trust and authentication technology company, has launched GroundCheck.ai — India's first AI-powered platform purpose-built to transform Contact Point Verification (CPV) for customers, merchants, and vendors across sectors. At...

Read moreDetails

C-Suite misalignment over GenAI adoption

by DigitalCIO Bureau
June 25, 2025
0
L&T Tech Services Accelerates Transition to Smart Vehicles with Generative AI on AWS

NTT DATA has launched its new report, “The AI Security Balancing Act: From Risk to Innovation,” highlighting the opportunities and risks AI presents in cybersecurity. The findings show...

Read moreDetails

Zithara was conceived as a highly modular platform; Co-founder-Varun Kashyap

by DigitalCIO Bureau
June 23, 2025
1
Zithara was conceived as a highly modular platform; Co-founder-Varun Kashyap

Our team works closely with clients to identify new revenue levers, optimize existing customer journeys, and continuously unlock incremental value. This outcome-driven partnership approach is what transforms us...

Read moreDetails
Next Post
Pure Storage Introduces GenAI Pod to Accelerate AI Innovation

Pure Storage Introduces GenAI Pod to Accelerate AI Innovation

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Cognizant Named A Leader in Finance and Accounting Digital Transformation

October 26, 2018

Spirent Test Solutions deployed by Beijing Daxing International Airport to assure Critical Communications

December 23, 2019

Salesforce To Drive Digital Transformation For Gulf Oil Lubricants India Ltd

August 8, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?