Over a third of A/NZ organisations targeted by APTs in 2015: FireEye

Over a third of A/NZ organisations targeted by APTs in 2015: FireEye

Local attacks 15 per cent more common than global average

FireEye's Advanced Threat Response Centre in North Sydney

FireEye's Advanced Threat Response Centre in North Sydney

Australian and New Zealand companies are increasingly falling victim to advanced persistent threat (APT) attacks with 35 per cent of local organisations exposed during the first half of 2015.

Security firm, FireEye, has for the first time, released figures directly relating to the A/NZ market in its 2015 Advanced Threat Report.

It stated that the amount of APT attacks in A/NZ were 15 per cent higher than the global average.

According to the vendor, the previous exposure rate released in its South-East Asia Threat Landscape Report in March was 27 per cent. The new figures indicate a 30 per cent increase in this sort of threat since then.

Sectors that most likely to be targeted with APTs are the Federal Government, telecommunications, high-tech and financial industries.

FireEye systems engineer director A/NZ, Richard Costanzo, explained the vendor had witnessed a number of attacks targeting government officials involved in trade negotiations like the Trans-Pacific Partnership (TPP) coming out of China and that certain types of attacks are consistently monitored coming out of the same regions.

“Most of the financial attacks we have seen typically come out of Russia and Eastern Europe. When you are talking about the intellectual property attacks, you are typically talking about China,” he said.

Ransomware continues to be a problem for organisations in the region, with variants of the Cryptowall family still among the top 10 most common types of malware that infect organisations in Asia Pacific and Japan (APJ).

This particular threat is particularly prevalent in APJ as Ransomware does not feature in any top 10 lists from other regions around the globe.

Costanzo explained that one of the reasons Ransomware was so persistent in the region was the propensity of local individuals and businesses to pay cyber-criminals to retrieve their encrypted files.

“When you’re a financial-based threat actor and you have a population that has a tendency to pay, you're going to run your attack even more. Unfortunately this leads to more and more persistent attacks,” he said.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags cybercrimeFireEyecyber espionageAPT


EDGE 2023

EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.


ARN has celebrated gender diversity and recognised female excellence across the Australian tech channel since first launching WIICTA in 2012, acknowledging the achievements of a talented group of female front runners who have become influential figures across the local industry.

ARN Innovation Awards 2023

Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.

Brand Post

Channel Roadmap

The Channel Roadmap is a bespoke content hub housing strategic priorities from technology vendors for 2022 and beyond, partners can find the guidance on the key technologies and markets to pursue, to help build a blueprint for future success.

Show Comments