According to the study, Patna registered the highest percentile of cyberattacks at 47% compared to the rest of the Tier-2 cities covered in the study, and higher than any Tier-1 city. Guwahati, Lucknow, Bhubaneswar, and Jaipur witnessed a massive 45%, 44%, 43% and 40% of cyber users coming under attack. The study states that approximately three out of every ten Indian cyber users encountered one or more cyberattacks, while metro cities have experienced a similar number of cyberattacks when compared to the previous quarter.
Commenting on the findings, Mr. J Kesavardhanan, Founder & CTO of K7 Computing said, “It is definitely an area of real concern for the country that considers itself a nation of villages. The positive trend of fast-growing Indian towns and smaller cities on the global landscape is certainly attracting the attention of cyber criminals who are becoming more and more sophisticated. It is not only a major threat to enterprises in these areas but also to consumers who are becoming heavy cyber users because of low Internet data cost, and easy and affordable availability of devices which can be exploited.”
Among metro cities, the cyber attacks in Delhi ballooned in Q2 with a 6% increase in the quarter-on-quarter infection rate. The Infection Rate in Cyber City Hyderabad is 41% from 39% recorded last quarter. Bengaluru and Pune experienced 39% and 35% of cyberattacks, similar to the previous quarter. Despite a 2% decrease in infection rate from the last quarter, Chennai still remains most vulnerable at 46%. Kolkata follows soon after at 41%. Ahmedabad, at 37%, witnessed a 1% drop in infection rate compared to the previous quarter, and Mumbai had an identical 30%.
“As we get set to enter the New Year 2020, I think it is important that companies, across sizes and geographies, start shifting from awareness to implementation in their approach towards cybersecurity. And this is not just applicable to enterprises but also to each and every cyber user in the country, including those in government departments. Awareness, implementation, and keeping it all up-to-date are very critical to remaining cybersafe in this fast growing and sophisticated cyber threat infused world,” concluded Mr. Kesavardhanan.
K7 Computing’s CTM is a quarterly report that provides an insightful look into the complex cybersecurity landscape in India, and makes cybersafety recommendations that address both Enterprise and Consumer segments. As part of this process, K7 Computing’s real-world telemetry data from almost 7 million unique devices and K7 Labs’ security incident investigation data were studied and presented in the form of an index. The report tracks all critical cybersecurity areas, such as Enterprise, Mobile, Mac, Windows and IoT, pan India covering 20 Indian cities including Metros and Tier-1 and Tier-2 regions, as well as State Capitals and high-user Union Territories.
Other Key Findings from the Study
Vulnerabilities Galore
- Exploitation of loopholes continued to be a major threat that impacted both Windows and iOS systems. While the iOS vulnerabilities were found in the iMessage service that exists in iPhone and Siri components, Remote Desktop Protocol (RDP) based attacks remained the dominant type of cyber threat in Windows
- Unpatched Virtual Private Networks (VPNs) continued to be an easy target for cyber criminals
WINDOWS
- USB storage device based threats remain the top malware risk for Windows users
- Besides malware, a large variety of Trojans, Potentially Unwanted Programs, adware, deceptors, and a bunch of coinminers were also found in the study
MOBILE DEVICES
- Adware continued to dominate as it remained a growing “sweet spot” for cybercriminals
- While many of the notorious Trojans and adware have strengthened their presence, a few new Android malware families were found this quarter
MAC
- Compared to the previous quarter, the number of PUPs (Potentially Unwanted Programs) observed this quarter was greater than that of traditional Trojans, indicating a rise in adware and unwanted applications
- Adware (55%) was a major threat under the PUP category, followed by Unwanted Apps (42%) and Coinminer (3%)
About K7 Computing
K7 Computing is a global provider of leading IT security solutions for enterprises and consumers. Incorporated in 1991, K7 Computing has its registered office in Chennai and a strong presence in all Indian states. With more than 20,000 channel partners, K7 Computing is protecting more than 25 million customers worldwide against threats to their IT environment. K7 Computing has always believed in offering completely indigenous security products to its users worldwide. The recent notification from the Indian Ministry of Electronics and Information Technology (MeitY) on procurement of 100% indigenous cybersecurity products establishes K7 Computing as the only Indian player to comply with the Public Procurement Order 2018 for Cyber Security Products.
K7 Computing was accepted as the first Indian antivirus company in Japan, partnering with SourceNext to distribute K7 Total Security under the name ‘Virus Security Zero’. SourceNext Corporation is Japan’s foremost domestic PC software seller with access to more than 25,000 retail shelves across the country. The widely acclaimed product commands a major market share in the retail segment in Japan. K7 Computing has received ISO 9001:2015 & 27001:2013 certification for Quality & Risk Management.
For more info: https://www.k7computing.com/in/
About K7 Labs:
K7 Labs is K7 Security’s threat research division. For over 27 years, K7 Labs has been at the forefront of antimalware research and threat intelligence, enabling customers to protect their businesses and lead safe and secure digital lives. At the heart of all K7 Security solutions is K7 Labs’ protection data and Ecosystem Threat Intelligence (K7ETI) which ensures that all K7 solutions leverage the best telemetric data about an adversary’s capabilities and tactics, enabling proactive prevention, detection, and mitigation of future cyberthreats and attacks. K7 Labs’ researchers regularly share their research work at several leading international cybersecurity research conferences such as Virus Bulletin, CARO, AMTSO, and AVAR, among others.