Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Notable difference between Canadian and US cyberthreats

20/01/2016 by

W1siziisijiwmtyvmdevmjavmtevmjkvndgvnzg3l0ftzxjpy2fuigfuzcbdyw5hzglhlmpwzyjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

A new publication has identified the differences between cyberthreats seen in Canada and those in the US. Each country’s approach to threat activity was also explained and could help chief information officers to make informed decisions about how to safeguard their organisations.

Natasha Hellberg, a threat researcher for Trend Micro, published a post on her blog about the cyber-risks in Canada. “Our culture, motivations, behaviours and political climate are all unique to Canada. These influence how threat actors here behave,” she explained in the What About Canada, Eh? – The Canadian Threat Landscape blog. The piece follows a previous report from Trend Micro about cybercrime either side of the US/Canada border.

As highlighted in the North American Underground: The Glass Tank report, cybercrime, although related, is distinctly different in Canada when compared with the US. Trend’s global threat communications team member Christopher Budd said: “For instance, just like in the United States there is a cybercrime underground in Canada. But, the Canadian cybercrime underground is smaller and focuses primarily on trafficking in counterfeit and stolen documents and credentials.”

One of the most prominent threats is the OpenCandy toolbar, Ms Hellberg says. This downloadable adware is often installed on computers unwittingly when it is included in other software packages that have been obtained from malicious websites. Once installed, it turns into downloads malware. Other commonly seen threats in Canada were banking trojans, infostealers and adware; meanwhile, DRIDEX continues to be a top threat.

One interesting point made in the report is the Canada hosts very few malicious sites; in fact, only 0.2 per cent of the global traffic to malicious websites is actually hosted in Canadian locations. Of this 0.2 per cent, most result in single IP locations, suggesting that these are circumstances when legitimate sites have been compromised.

Concluding her post, Ms Hellberg stated: “Finally, it was comforting to note that in addition to the lack of underground service/infrastructure offerings, there also appears to be a no market for violent crime-related services. We could not find weapons for sale or murder-for-hire offers, nor ‘all services’ trafficking-type underground services hosted in Canada, or serving a primarily Canadian market. We can only assume that Canadian’s reputation for being nice and law abiding appears also extends to its underground.”

With Canada’s cyberthreat activity being publicised, it could be wise for chief information officers to look at the nation’s policies regarding online threats and make decisions based on these. After all, with threat actors having a distinctly different make-up to those across the border, there could be insights for organisations to implement on their own turf.

About Us

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment, Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...