Interpol detects 9,000 malware in Asean servers, websites

Share on facebook
Share on twitter
Share on linkedin
Share on email

Image credit: Kaspersky Lab Image credit: Kaspersky Lab[/caption] The operation, run out of the Interpol Global Complex for Innovation (IGCI) based in Singapore, brought together investigators from seven countries — Indonesia, Malaysia, Myanmar, the Philippines, Singapore, Thailand, and Vietnam — to share information on specific cybercrime situations in each country. According to the analysis, the affected websites were infected with a malware code which exploited a vulnerability in the website design application. “Among them were several government websites which may have contained personal data of their citizens,” said the Interpol. It was noted that the malware-laden servers were involved in targeting financial institutions, spreading ransomware, launching distributed denial of service (DDoS) attacks, and distributing spam. The Interpol said a number of phishing website operators were also identified, including one with links to Nigeria. Investigations are still ongoing. IGCI executive director Noboru Nakatani said the operation was a perfect example of how the public and private sectors can work efficiently together in combating cybercrime. “Sharing intelligence was the basis of the success of this operation, and such cooperation is vital for long term effectiveness in managing cooperation networks for both future operations and day to day activity in combating cybercrime,” he added. Meanwhile, Interpol highlighted the need for law enforcement to proactively investigate vulnerabilities exploited by cybercriminals, rather than waiting for reports from victims. Cheng Khee Boon, commander of Singapore Police Force (SPF) Cybercrime Command said, “SPF will continue to work closely with our Asean counterparts and the Interpol community to eradicate criminal activities in the cyberspace.” ? PNA/Xinhua ]]>

Facebook Comments

Latest Posts

Archives