Connect with us

APT

  •   From January to September 2022 computers in the industrial control systems ICS environment were attacked using multiple means In the META region malicious objects were blocked on 38 of ICS computers in the region that were protected by Kaspersky www Kaspersky co za solutions according to Kaspersky ICS CERT statistics Globally the share of ICS computers with blocked malicious objects stands at 31 8 APT attacks on industrial systems are expected to get even more sophisticated in the coming months ICS computers are used in oil amp gas energy automotive manufacturing building automation infrastructures and other spheres to perform a range of OT functions from the workstations of engineers and operators to supervisory control and data acquisition SCADA servers and Human Machine Interface HMI Cyberattacks on industrial computers are considered to be extremely dangerous as they may cause material losses and production downtime for the controlled production line and even the facility as a whole Moreover industrial enterprises put out of service can seriously undermine a region s social welfare ecology and macroeconomics During the three quarters of 2022 in the META region ICS computers in the oil and gas sector faced attacks most often 39 3 of them got attacked Attacks on building automation systems were in second place 38 8 of ICS computers in this sector were targeted The energy sector was also among the top 3 environments that got attacked 36 8 of computers there were affected In total in January September 2022 various types of malicious objects were blocked on 38 of ICS computers in the META region Of these most attacks on ICS infrastructure came from the Internet 28 2 9 9 of attacks were made through email clients 7 0 of attacks were conducted through removable media 0 9 through network folders In Nigeria various types of malicious objects were blocked on 38 7 of ICS computers between January September 2022 Of these 19 4 came from the Internet and 3 5 of attacks were made through email clients 10 7 of attacks were conducted through removable media APT attacks on industrial systems are expected to get even more sophisticated in the coming months The targets will be organisations in agriculture logistics amp transportation energy mining chemical machine tool industry sectors as well as the sectors of renewable energy and Hi Tech Another trend seen by Kaspersky for the remainder of 2022 and the next year is the rise of ransomware in ICS environments Ransomware groups have come a long way scattered gangs become organised businesses and form a full fledged industry We are seeing more cases where ransomware attacks including those on ICS computers are performed manually in a time consuming yet efficient manner The period of global instability provokes global semiconductor shortage In turn that causes companies to lower their budgets on cybersecurity which becomes a critical issue in 2022 2023 especially in view of the evolving threat landscape Critical industrial infrastructure solutions will be a new target for cybercrime says Vladimir Dashchenko Kaspersky Industrial Control Systems Cyber Emergency Response Team expert Read more about the ICS threat landscape on the Kaspersky ICS CERT website http bit ly 3OncIGK To keep your OT computers protected from various threats Kaspersky experts recommend Conducting regular security assessments of OT systems to identify and eliminate possible cyber security issues Establishing continuous vulnerability assessment and triage as a base for effective vulnerability management process Dedicated solutions like Kaspersky Industrial CyberSecurity http bit ly 3UVSDd9 may become an efficient assistant and a source of unique actionable information not fully available in public Performing timely updates for the key components of the enterprise s OT network applying security fixes and patches or implementing compensating measures as soon as it is technically possible is crucial for preventing a major incident that might cost millions due to the interruption of the production process Using EDR solutions such as Kaspersky Endpoint Detection and Response http bit ly 3URTOu8 for timely detection of sophisticated threats investigation and effective remediation of incidents Improving the response to new and advanced malicious techniques by building and strengthening security teams incident prevention detection and response skills Dedicated OT security trainings for IT security teams and OT personnel is one of the key measures helping to achieve this
    38% of industrial computers were under attack in the Middle East, Turkey and Africa (META) region in January-September 2022, more attacks expected to come
      From January to September 2022 computers in the industrial control systems ICS environment were attacked using multiple means In the META region malicious objects were blocked on 38 of ICS computers in the region that were protected by Kaspersky www Kaspersky co za solutions according to Kaspersky ICS CERT statistics Globally the share of ICS computers with blocked malicious objects stands at 31 8 APT attacks on industrial systems are expected to get even more sophisticated in the coming months ICS computers are used in oil amp gas energy automotive manufacturing building automation infrastructures and other spheres to perform a range of OT functions from the workstations of engineers and operators to supervisory control and data acquisition SCADA servers and Human Machine Interface HMI Cyberattacks on industrial computers are considered to be extremely dangerous as they may cause material losses and production downtime for the controlled production line and even the facility as a whole Moreover industrial enterprises put out of service can seriously undermine a region s social welfare ecology and macroeconomics During the three quarters of 2022 in the META region ICS computers in the oil and gas sector faced attacks most often 39 3 of them got attacked Attacks on building automation systems were in second place 38 8 of ICS computers in this sector were targeted The energy sector was also among the top 3 environments that got attacked 36 8 of computers there were affected In total in January September 2022 various types of malicious objects were blocked on 38 of ICS computers in the META region Of these most attacks on ICS infrastructure came from the Internet 28 2 9 9 of attacks were made through email clients 7 0 of attacks were conducted through removable media 0 9 through network folders In Nigeria various types of malicious objects were blocked on 38 7 of ICS computers between January September 2022 Of these 19 4 came from the Internet and 3 5 of attacks were made through email clients 10 7 of attacks were conducted through removable media APT attacks on industrial systems are expected to get even more sophisticated in the coming months The targets will be organisations in agriculture logistics amp transportation energy mining chemical machine tool industry sectors as well as the sectors of renewable energy and Hi Tech Another trend seen by Kaspersky for the remainder of 2022 and the next year is the rise of ransomware in ICS environments Ransomware groups have come a long way scattered gangs become organised businesses and form a full fledged industry We are seeing more cases where ransomware attacks including those on ICS computers are performed manually in a time consuming yet efficient manner The period of global instability provokes global semiconductor shortage In turn that causes companies to lower their budgets on cybersecurity which becomes a critical issue in 2022 2023 especially in view of the evolving threat landscape Critical industrial infrastructure solutions will be a new target for cybercrime says Vladimir Dashchenko Kaspersky Industrial Control Systems Cyber Emergency Response Team expert Read more about the ICS threat landscape on the Kaspersky ICS CERT website http bit ly 3OncIGK To keep your OT computers protected from various threats Kaspersky experts recommend Conducting regular security assessments of OT systems to identify and eliminate possible cyber security issues Establishing continuous vulnerability assessment and triage as a base for effective vulnerability management process Dedicated solutions like Kaspersky Industrial CyberSecurity http bit ly 3UVSDd9 may become an efficient assistant and a source of unique actionable information not fully available in public Performing timely updates for the key components of the enterprise s OT network applying security fixes and patches or implementing compensating measures as soon as it is technically possible is crucial for preventing a major incident that might cost millions due to the interruption of the production process Using EDR solutions such as Kaspersky Endpoint Detection and Response http bit ly 3URTOu8 for timely detection of sophisticated threats investigation and effective remediation of incidents Improving the response to new and advanced malicious techniques by building and strengthening security teams incident prevention detection and response skills Dedicated OT security trainings for IT security teams and OT personnel is one of the key measures helping to achieve this
    38% of industrial computers were under attack in the Middle East, Turkey and Africa (META) region in January-September 2022, more attacks expected to come
    Africa2 months ago

    38% of industrial computers were under attack in the Middle East, Turkey and Africa (META) region in January-September 2022, more attacks expected to come

    From January to September 2022, computers in the industrial control systems (ICS) environment were attacked using multiple means.

    In the META region, malicious objects were blocked on 38% of ICS computers in the region that were protected by Kaspersky (www.Kaspersky.co.za) solutions, according to Kaspersky ICS CERT statistics.

    Globally the share of ICS computers with blocked malicious objects stands at 31,8%.

    APT attacks on industrial systems are expected to get even more sophisticated in the coming months.

    ICS computers are used in oil & gas, energy, automotive manufacturing, building automation infrastructures and other spheres to perform a range of OT functions – from the workstations of engineers and operators to supervisory control and data acquisition (SCADA) servers and Human Machine Interface (HMI).

    Cyberattacks on industrial computers are considered to be extremely dangerous as they may cause material losses and production downtime for the controlled production line and even the facility as a whole.

    Moreover, industrial enterprises put out of service can seriously undermine a region’s social welfare, ecology and macroeconomics.

    During the three quarters of 2022 in the META region, ICS computers in the oil and gas sector faced attacks most often (39,3% of them got attacked).

    Attacks on building automation systems were in second place – 38,8% of ICS computers in this sector were targeted.

    The energy sector was also among the top-3 environments that got attacked (36,8% of computers there were affected). 

    In total, in January-September 2022 various types of malicious objects were blocked on 38% of ICS computers in the META region.

    Of these, most attacks on ICS infrastructure came from the Internet (28,2%).

    9,9% of attacks were made through email clients.

    7,0% of attacks were conducted through removable media, 0,9% – through network folders.

    In Nigeria, various types of malicious objects were blocked on 38.7% of ICS computers between January-September 2022.

    Of these, 19.4% came from the Internet and 3.5% of attacks were made through email clients.

    10.7% of attacks were conducted through removable media. 

    APT attacks on industrial systems are expected to get even more sophisticated in the coming months.

    The targets will be organisations in agriculture, logistics & transportation, energy (mining, chemical, machine tool industry) sectors, as well as the sectors of renewable energy and Hi-Tech. Another trend seen by Kaspersky for the remainder of 2022 and the next year is the rise of ransomware in ICS environments.

    Ransomware groups have come a long way: scattered gangs become organised businesses and form a full-fledged industry.

    We are seeing more cases where ransomware attacks, including those on ICS computers, are performed manually, in a time-consuming, yet efficient manner.

    “The period of global instability provokes global semiconductor shortage.

    In turn, that causes companies to lower their budgets on cybersecurity, which becomes a critical issue in 2022-2023, especially in view of the evolving threat landscape.

    Critical industrial infrastructure solutions will be a new target for cybercrime,” says Vladimir Dashchenko, Kaspersky Industrial Control Systems Cyber Emergency Response Team expert.

    Read more about the ICS threat landscape on the Kaspersky ICS CERT website (http://bit.ly/3OncIGK).

    To keep your OT computers protected from various threats, Kaspersky experts recommend: Conducting regular security assessments of OT systems to identify and eliminate possible cyber security issues.

    Establishing continuous vulnerability assessment and triage as a base for effective vulnerability management process.

    Dedicated solutions like Kaspersky Industrial CyberSecurity (http://bit.ly/3UVSDd9) may become an efficient assistant and a source of unique actionable information, not fully available in public.

    Performing timely updates for the key components of the enterprise’s OT network; applying security fixes and patches or implementing compensating measures as soon as it is technically possible is crucial for preventing a major incident that might cost millions due to the interruption of the production process.

    Using EDR solutions such as Kaspersky Endpoint Detection and Response (http://bit.ly/3URTOu8) for timely detection of sophisticated threats, investigation, and effective remediation of incidents.

    Improving the response to new and advanced malicious techniques by building and strengthening security teams’ incident prevention, detection, and response skills.

    Dedicated OT security trainings for IT security teams and OT personnel is one of the key measures helping to achieve this.

  •   Por Ning Yun director del departamento de almacenamiento de datos de Huawei SAR Huawei com El ransomware est atacando a un ritmo alarmante La empresa de consultor a e investigaci n de tecnolog a de la informaci n Gartner predice que para 2025 al menos el 75 de las organizaciones de TI enfrentar n uno o m s ataques Las herramientas de pirater a refinadas y las estrategias de extorsi n han convertido al ransomware en la mayor amenaza para la seguridad de los datos individuales empresariales y nacionales Los constantes ataques de ransomware causan grandes da os Cuando ataca roba y cifra datos valiosos Los datos cifrados solo se pueden descifrar pagando un rescate a los piratas inform ticos Los piratas inform ticos que trabajan a trav s de redes oscuras generalmente exigen Bitcoin para que el pago sea lo m s dif cil posible de rastrear El da o que crea el ransomware es grande al igual que las ganancias de los piratas inform ticos Seg n la consultora l der en inversiones Cybersecurity Ventures para 2031 se espera que el ransomware ataque a una empresa consumidor o dispositivo cada 2 segundos En 2021 este n mero fue de solo 11 segundos Incluso con esa frecuencia m s baja ese mismo a o los da os globales por ransomware alcanzaron los 20 000 millones de d lares 61 veces m s que en 2015 325 millones de d lares El rescate m s grande hasta ahora fue de 70 millones de d lares Pero los rescates resuelven el problema No Un informe de Cybereason muestra que el 49 de las empresas que pagan el rescate recuperan solo una parte de sus datos o ninguno en absoluto El 80 de las empresas que pagan el rescate son atacadas por segunda vez Los rescates tampoco son el nico problema el ransomware da a las marcas provoca largas interrupciones en el servicio expone a las empresas a responsabilidades legales y m s Dicho da o colateral puede ser enorme tanto como 23 veces el rescate En marzo de 2021 los piratas inform ticos cifraron 15 000 dispositivos pertenecientes a una corporaci n de seguros Gran cantidad de archivos de datos de clientes corr an el riesgo de ser filtrados La empresa pag 40 millones de d lares para recuperar los datos En mayo de 2021 el ransomware detuvo todas las operaciones de un gigante de oleoductos durante 11 d as Los precios de la gasolina en el pa s subieron a su nivel m s alto en siete a os lo que provoc compras de p nico La empresa pag un rescate de 4 4 millones de d lares En abril de 2022 un importante fabricante de autom viles tuvo que reducir su producci n anual en 500 000 veh culos tras un ataque a sus proveedores que provoc una fuga de datos de 1 4 TB En mayo de 2022 dos oleadas de ataques provocaron que un pa s declarara una emergencia de ciberseguridad Da aron servicios b sicos como la atenci n m dica e incluso el comercio internacional Hay muchos m s ejemplos Los piratas inform ticos se dirigen a empresas e industrias grandes y de alto valor El gobierno la energ a el transporte las finanzas la manufactura y la atenci n m dica son sus principales objetivos pero nadie est a salvo Tendencias de ransomware para saber Ransomware es extremadamente bueno para disfrazarse Tiene muchas formas de ingresar a su sistema por ejemplo almacenamiento correos electr nicos de phishing troyanos redes sociales e informaci n privilegiada malintencionada Es dif cil de detectar y defenderse Un ataque t pico cifra o elimina todas las copias de datos locales e incluso puede tener como objetivo los centros de recuperaci n ante desastres DR lo que hace imposible restaurar r pidamente los datos Lo que sigue seg n un informe de ZDNet es un promedio de 16 d as h biles de tiempo de inactividad del sistema El coste medio de recuperaci n de un ataque calculado por Sophos es de 1 85 millones de d lares Hay cuatro tendencias importantes de ransomware Los piratas inform ticos se centran en las grandes empresas y la infraestructura En lugar de lanzar campa as amplias los ataques de ransomware ahora se centran cada vez m s en objetivos de alto valor La investigaci n que los piratas inform ticos deben realizar para que este enfoque funcione es dif cil y lleva mucho tiempo semanas o incluso meses y costoso pero las ganancias potenciales hacen que valga la pena Los ataques elaborados hacen que incluso las organizaciones previamente bien protegidas sean v ctimas potenciales y tambi n amenazan a los departamentos gubernamentales Ransomware como servicio RaaS El r pido desarrollo de las tecnolog as de red e informaci n as como las monedas digitales cifradas ha creado un semillero para los actores malintencionados Los operadores de ransomware ahora venden servicios relacionados con ransomware a otros atacantes a trav s de soluciones personalizadas membres as o suscripciones Esto reduce la barrera de entrada para lanzar ataques de ransomware lo que resulta en un crecimiento explosivo de ransomware La doble extorsi n se convierte en el nuevo Ransomware normal no se limita a cifrar datos y exigir rescates Los atacantes tambi n roban datos y amenazan con filtrarlos Incluso si una empresa tiene una copia de seguridad reciente a n no puede correr el riesgo de una fuga de informaci n confidencial y el subsiguiente escrutinio p blico y procedimientos de cumplimiento Capacidades de ataque tipo APT La amenaza persistente avanzada APT se refiere a un ataque de red continuo y complejo personalizado por atacantes expertos para aprovechar al m ximo las vulnerabilidades de la v ctima Los ataques de ransomware cada vez con mayor precisi n y planificaci n comienzan a mostrar un gran parecido con los ataques APT Necesidades de seguridad de datos El ransomware complejo plantea un gran desaf o para muchas medidas de defensa actuales La protecci n de seguridad de datos tradicional se centra en la red como el firewall y las puertas de enlace de seguridad y en los hosts para evitar las intrusiones de ransomware y limitar la propagaci n Esto sin embargo descuida la capacidad del ransomware para disfrazarse y acechar en el sistema durante mucho tiempo para obtener permisos de acceso a un gran volumen de datos clave En otras palabras una vez que el sistema est infectado la protecci n de seguridad de datos tradicional es in til Se necesita una mejor soluci n El marco de defensa en profundidad desarrollado por el contratista de defensa Northrop Grumman brinda buenas ideas sobre c mo avanzar y construir una protecci n m s s lida Este enfoque de ciberseguridad presenta cinco capas de mecanismos defensivos per metro red punto final aplicaci n y seguridad de datos La protecci n de seguridad perimetral y de red establecida en la capa de red defiende mediante firewalls sandboxes y conocimiento de la situaci n La protecci n de seguridad de endpoints y aplicaciones establecida en la capa de host defiende mediante control de acceso parches y auditor as de seguridad y software antivirus La ltima capa la seguridad de los datos es donde entra en juego el almacenamiento de datos En la era digital moderna el almacenamiento de datos debe hacer m s que solo almacenar datos Debe servir como la ltima l nea de defensa proteger los datos con tecnolog as antimanipulaci n detectar E S anormales generadas por ransomware y evitar fugas de datos mediante tecnolog as de cifrado Adem s de todo esto debe asegurarse de que sea posible recuperar datos limpios y no infectados manteniendo copias de datos en almacenamiento de respaldo y en una zona f sicamente aislada Creaci n de una poderosa defensa contra ransomware con almacenamiento profesional Al brindar protecci n doble con producci n y almacenamiento de respaldo la soluci n de almacenamiento con protecci n contra ransomware de Huawei utiliza cuatro tecnolog as clave para crear una soluci n completa que evita que los virus se escondan roben o manipulen los datos detecci n de ransomware antimanipulaci n de datos replicaci n de espacio de aire y cifrado de datos de extremo a extremo Echemos un vistazo a por qu la protecci n dual y las cuatro caracter sticas clave son tan efectivas Protecci n dual contra ransomware con almacenamiento principal y de respaldo En esta soluci n tanto el almacenamiento primario como el de respaldo OceanProtect Backup Storage brindan funciones integrales de protecci n contra ransomware lo que garantiza la el sistema siempre tiene una copia de datos limpia para una r pida recuperaci n del servicio OceanProtect Backup Storage tambi n proporciona una velocidad de recuperaci n ultrarr pida hasta 172 TB hora cinco veces m s r pido que el punto de referencia de la industria Esto ayuda a las empresas a reducir dr sticamente el tiempo de inactividad del servicio y las p rdidas econ micas Cuatro tecnolog as clave para una protecci n integral Detecci n de ransomware el ransomware no tiene d nde esconderse la funci n de an lisis y detecci n de ransomware de Huawei ofrece una precisi n del 99 9 para la producci n y el almacenamiento de copias de seguridad antes durante y despu s de los ataques Antes de un ataque el almacenamiento trabaja para interceptar el ransomware antes de que tenga la oportunidad de atacar Si a n ocurre un ataque el almacenamiento act a r pidamente para proteger el sistema trabajando con dispositivos de seguridad como firewalls para aislar los hosts que env an E S anormales evitando que el ransomware se propague a otros hosts Despu s del ataque el almacenamiento examina las copias de datos para asegurarse de que est n limpias Prevenci n de manipulaci n de datos los datos no se pueden modificar el sistema de archivos WORM y la tecnolog a de instant neas seguras bloquean la manipulaci n de archivos El sistema WORM admite la configuraci n de un per odo de protecci n evitando la modificaci n o eliminaci n de datos de producci n o copia de seguridad durante el per odo Las instant neas seguras de solo lectura brindan una protecci n similar no permiten la eliminaci n o modificaci n de datos durante un per odo de protecci n configurado Aislamiento f sico las copias de datos limpios est n f sicamente aisladas la tecnolog a Air gap permite almacenar una copia limpia de los datos de almacenamiento de producci n y respaldo en una zona f sicamente aislada Incluso si por improbable que sea tanto la producci n como el almacenamiento de respaldo se ven comprometidos la zona de aislamiento tendr una copia limpia que se puede usar para restaurar r pidamente los servicios La configuraci n del Acuerdo de nivel de servicio SLA de replicaci n replicar autom ticamente copias de datos peri dicas desde el almacenamiento de producci n o respaldo al entorno de aislamiento Dado que el enlace de replicaci n est activo solo durante la replicaci n la posibilidad de que el ransomware acceda a los datos en la zona de aislamiento es relativamente baja Para mayor seguridad el almacenamiento de la zona de aislamiento tambi n cuenta con protecci n de datos de m ltiples capas que admite funciones antimanipulaci n como instant neas seguras Cifrado de extremo a extremo los datos no se filtrar n el almacenamiento de Huawei garantiza cero fugas de datos en la red de transmisi n de almacenamiento y el almacenamiento a trav s del cifrado de almacenamiento de protocolo producci n y respaldo enlace de replicaci n de espacio a reo y transmisi n de datos de replicaci n remota y copias de seguridad Incluso si los piratas inform ticos rompen el almacenamiento o se entrometen en la red de almacenamiento no tienen acceso a los datos confidenciales gracias a la implementaci n del cifrado Cifrado de extremo a extremo los datos no se filtrar n el almacenamiento de Huawei utiliza tecnolog a de cifrado de extremo a extremo para garantizar que no se filtren datos en los dispositivos de almacenamiento ni en la red de transmisi n de almacenamiento El cifrado cubre los datos de protocolo producci n y copia de seguridad el enlace de replicaci n de espacio a reo y la replicaci n de datos remotos Incluso si los piratas inform ticos logran ingresar a un sistema no descifrar n los datos confidenciales Defensa contra el ransomware La soluci n de almacenamiento con protecci n contra ransomware de Huawei funciona las 24 horas del d a los 7 d as de la semana en todo el mundo para grandes clientes de energ a finanzas transporte fabricaci n y gobierno M s vale prevenir que lamentar Instalar protecci n contra ransomware despu s del hecho es demasiado tarde Una soluci n integral de almacenamiento con protecci n contra ransomware es la mejor manera de detener o mitigar el ransomware Para obtener m s informaci n sobre c mo puede crear una defensa poderosa para sus datos visite nuestro sitio web https bit ly 3RRI74g
    ¿Cómo construimos una defensa poderosa con el almacenamiento de datos? (Por Ning Yun)
      Por Ning Yun director del departamento de almacenamiento de datos de Huawei SAR Huawei com El ransomware est atacando a un ritmo alarmante La empresa de consultor a e investigaci n de tecnolog a de la informaci n Gartner predice que para 2025 al menos el 75 de las organizaciones de TI enfrentar n uno o m s ataques Las herramientas de pirater a refinadas y las estrategias de extorsi n han convertido al ransomware en la mayor amenaza para la seguridad de los datos individuales empresariales y nacionales Los constantes ataques de ransomware causan grandes da os Cuando ataca roba y cifra datos valiosos Los datos cifrados solo se pueden descifrar pagando un rescate a los piratas inform ticos Los piratas inform ticos que trabajan a trav s de redes oscuras generalmente exigen Bitcoin para que el pago sea lo m s dif cil posible de rastrear El da o que crea el ransomware es grande al igual que las ganancias de los piratas inform ticos Seg n la consultora l der en inversiones Cybersecurity Ventures para 2031 se espera que el ransomware ataque a una empresa consumidor o dispositivo cada 2 segundos En 2021 este n mero fue de solo 11 segundos Incluso con esa frecuencia m s baja ese mismo a o los da os globales por ransomware alcanzaron los 20 000 millones de d lares 61 veces m s que en 2015 325 millones de d lares El rescate m s grande hasta ahora fue de 70 millones de d lares Pero los rescates resuelven el problema No Un informe de Cybereason muestra que el 49 de las empresas que pagan el rescate recuperan solo una parte de sus datos o ninguno en absoluto El 80 de las empresas que pagan el rescate son atacadas por segunda vez Los rescates tampoco son el nico problema el ransomware da a las marcas provoca largas interrupciones en el servicio expone a las empresas a responsabilidades legales y m s Dicho da o colateral puede ser enorme tanto como 23 veces el rescate En marzo de 2021 los piratas inform ticos cifraron 15 000 dispositivos pertenecientes a una corporaci n de seguros Gran cantidad de archivos de datos de clientes corr an el riesgo de ser filtrados La empresa pag 40 millones de d lares para recuperar los datos En mayo de 2021 el ransomware detuvo todas las operaciones de un gigante de oleoductos durante 11 d as Los precios de la gasolina en el pa s subieron a su nivel m s alto en siete a os lo que provoc compras de p nico La empresa pag un rescate de 4 4 millones de d lares En abril de 2022 un importante fabricante de autom viles tuvo que reducir su producci n anual en 500 000 veh culos tras un ataque a sus proveedores que provoc una fuga de datos de 1 4 TB En mayo de 2022 dos oleadas de ataques provocaron que un pa s declarara una emergencia de ciberseguridad Da aron servicios b sicos como la atenci n m dica e incluso el comercio internacional Hay muchos m s ejemplos Los piratas inform ticos se dirigen a empresas e industrias grandes y de alto valor El gobierno la energ a el transporte las finanzas la manufactura y la atenci n m dica son sus principales objetivos pero nadie est a salvo Tendencias de ransomware para saber Ransomware es extremadamente bueno para disfrazarse Tiene muchas formas de ingresar a su sistema por ejemplo almacenamiento correos electr nicos de phishing troyanos redes sociales e informaci n privilegiada malintencionada Es dif cil de detectar y defenderse Un ataque t pico cifra o elimina todas las copias de datos locales e incluso puede tener como objetivo los centros de recuperaci n ante desastres DR lo que hace imposible restaurar r pidamente los datos Lo que sigue seg n un informe de ZDNet es un promedio de 16 d as h biles de tiempo de inactividad del sistema El coste medio de recuperaci n de un ataque calculado por Sophos es de 1 85 millones de d lares Hay cuatro tendencias importantes de ransomware Los piratas inform ticos se centran en las grandes empresas y la infraestructura En lugar de lanzar campa as amplias los ataques de ransomware ahora se centran cada vez m s en objetivos de alto valor La investigaci n que los piratas inform ticos deben realizar para que este enfoque funcione es dif cil y lleva mucho tiempo semanas o incluso meses y costoso pero las ganancias potenciales hacen que valga la pena Los ataques elaborados hacen que incluso las organizaciones previamente bien protegidas sean v ctimas potenciales y tambi n amenazan a los departamentos gubernamentales Ransomware como servicio RaaS El r pido desarrollo de las tecnolog as de red e informaci n as como las monedas digitales cifradas ha creado un semillero para los actores malintencionados Los operadores de ransomware ahora venden servicios relacionados con ransomware a otros atacantes a trav s de soluciones personalizadas membres as o suscripciones Esto reduce la barrera de entrada para lanzar ataques de ransomware lo que resulta en un crecimiento explosivo de ransomware La doble extorsi n se convierte en el nuevo Ransomware normal no se limita a cifrar datos y exigir rescates Los atacantes tambi n roban datos y amenazan con filtrarlos Incluso si una empresa tiene una copia de seguridad reciente a n no puede correr el riesgo de una fuga de informaci n confidencial y el subsiguiente escrutinio p blico y procedimientos de cumplimiento Capacidades de ataque tipo APT La amenaza persistente avanzada APT se refiere a un ataque de red continuo y complejo personalizado por atacantes expertos para aprovechar al m ximo las vulnerabilidades de la v ctima Los ataques de ransomware cada vez con mayor precisi n y planificaci n comienzan a mostrar un gran parecido con los ataques APT Necesidades de seguridad de datos El ransomware complejo plantea un gran desaf o para muchas medidas de defensa actuales La protecci n de seguridad de datos tradicional se centra en la red como el firewall y las puertas de enlace de seguridad y en los hosts para evitar las intrusiones de ransomware y limitar la propagaci n Esto sin embargo descuida la capacidad del ransomware para disfrazarse y acechar en el sistema durante mucho tiempo para obtener permisos de acceso a un gran volumen de datos clave En otras palabras una vez que el sistema est infectado la protecci n de seguridad de datos tradicional es in til Se necesita una mejor soluci n El marco de defensa en profundidad desarrollado por el contratista de defensa Northrop Grumman brinda buenas ideas sobre c mo avanzar y construir una protecci n m s s lida Este enfoque de ciberseguridad presenta cinco capas de mecanismos defensivos per metro red punto final aplicaci n y seguridad de datos La protecci n de seguridad perimetral y de red establecida en la capa de red defiende mediante firewalls sandboxes y conocimiento de la situaci n La protecci n de seguridad de endpoints y aplicaciones establecida en la capa de host defiende mediante control de acceso parches y auditor as de seguridad y software antivirus La ltima capa la seguridad de los datos es donde entra en juego el almacenamiento de datos En la era digital moderna el almacenamiento de datos debe hacer m s que solo almacenar datos Debe servir como la ltima l nea de defensa proteger los datos con tecnolog as antimanipulaci n detectar E S anormales generadas por ransomware y evitar fugas de datos mediante tecnolog as de cifrado Adem s de todo esto debe asegurarse de que sea posible recuperar datos limpios y no infectados manteniendo copias de datos en almacenamiento de respaldo y en una zona f sicamente aislada Creaci n de una poderosa defensa contra ransomware con almacenamiento profesional Al brindar protecci n doble con producci n y almacenamiento de respaldo la soluci n de almacenamiento con protecci n contra ransomware de Huawei utiliza cuatro tecnolog as clave para crear una soluci n completa que evita que los virus se escondan roben o manipulen los datos detecci n de ransomware antimanipulaci n de datos replicaci n de espacio de aire y cifrado de datos de extremo a extremo Echemos un vistazo a por qu la protecci n dual y las cuatro caracter sticas clave son tan efectivas Protecci n dual contra ransomware con almacenamiento principal y de respaldo En esta soluci n tanto el almacenamiento primario como el de respaldo OceanProtect Backup Storage brindan funciones integrales de protecci n contra ransomware lo que garantiza la el sistema siempre tiene una copia de datos limpia para una r pida recuperaci n del servicio OceanProtect Backup Storage tambi n proporciona una velocidad de recuperaci n ultrarr pida hasta 172 TB hora cinco veces m s r pido que el punto de referencia de la industria Esto ayuda a las empresas a reducir dr sticamente el tiempo de inactividad del servicio y las p rdidas econ micas Cuatro tecnolog as clave para una protecci n integral Detecci n de ransomware el ransomware no tiene d nde esconderse la funci n de an lisis y detecci n de ransomware de Huawei ofrece una precisi n del 99 9 para la producci n y el almacenamiento de copias de seguridad antes durante y despu s de los ataques Antes de un ataque el almacenamiento trabaja para interceptar el ransomware antes de que tenga la oportunidad de atacar Si a n ocurre un ataque el almacenamiento act a r pidamente para proteger el sistema trabajando con dispositivos de seguridad como firewalls para aislar los hosts que env an E S anormales evitando que el ransomware se propague a otros hosts Despu s del ataque el almacenamiento examina las copias de datos para asegurarse de que est n limpias Prevenci n de manipulaci n de datos los datos no se pueden modificar el sistema de archivos WORM y la tecnolog a de instant neas seguras bloquean la manipulaci n de archivos El sistema WORM admite la configuraci n de un per odo de protecci n evitando la modificaci n o eliminaci n de datos de producci n o copia de seguridad durante el per odo Las instant neas seguras de solo lectura brindan una protecci n similar no permiten la eliminaci n o modificaci n de datos durante un per odo de protecci n configurado Aislamiento f sico las copias de datos limpios est n f sicamente aisladas la tecnolog a Air gap permite almacenar una copia limpia de los datos de almacenamiento de producci n y respaldo en una zona f sicamente aislada Incluso si por improbable que sea tanto la producci n como el almacenamiento de respaldo se ven comprometidos la zona de aislamiento tendr una copia limpia que se puede usar para restaurar r pidamente los servicios La configuraci n del Acuerdo de nivel de servicio SLA de replicaci n replicar autom ticamente copias de datos peri dicas desde el almacenamiento de producci n o respaldo al entorno de aislamiento Dado que el enlace de replicaci n est activo solo durante la replicaci n la posibilidad de que el ransomware acceda a los datos en la zona de aislamiento es relativamente baja Para mayor seguridad el almacenamiento de la zona de aislamiento tambi n cuenta con protecci n de datos de m ltiples capas que admite funciones antimanipulaci n como instant neas seguras Cifrado de extremo a extremo los datos no se filtrar n el almacenamiento de Huawei garantiza cero fugas de datos en la red de transmisi n de almacenamiento y el almacenamiento a trav s del cifrado de almacenamiento de protocolo producci n y respaldo enlace de replicaci n de espacio a reo y transmisi n de datos de replicaci n remota y copias de seguridad Incluso si los piratas inform ticos rompen el almacenamiento o se entrometen en la red de almacenamiento no tienen acceso a los datos confidenciales gracias a la implementaci n del cifrado Cifrado de extremo a extremo los datos no se filtrar n el almacenamiento de Huawei utiliza tecnolog a de cifrado de extremo a extremo para garantizar que no se filtren datos en los dispositivos de almacenamiento ni en la red de transmisi n de almacenamiento El cifrado cubre los datos de protocolo producci n y copia de seguridad el enlace de replicaci n de espacio a reo y la replicaci n de datos remotos Incluso si los piratas inform ticos logran ingresar a un sistema no descifrar n los datos confidenciales Defensa contra el ransomware La soluci n de almacenamiento con protecci n contra ransomware de Huawei funciona las 24 horas del d a los 7 d as de la semana en todo el mundo para grandes clientes de energ a finanzas transporte fabricaci n y gobierno M s vale prevenir que lamentar Instalar protecci n contra ransomware despu s del hecho es demasiado tarde Una soluci n integral de almacenamiento con protecci n contra ransomware es la mejor manera de detener o mitigar el ransomware Para obtener m s informaci n sobre c mo puede crear una defensa poderosa para sus datos visite nuestro sitio web https bit ly 3RRI74g
    ¿Cómo construimos una defensa poderosa con el almacenamiento de datos? (Por Ning Yun)
    Africa3 months ago

    ¿Cómo construimos una defensa poderosa con el almacenamiento de datos? (Por Ning Yun)

    Por Ning Yun, director del departamento de almacenamiento de datos de Huawei SAR (Huawei.com) El ransomware está atacando a un ritmo alarmante.

    La empresa de consultoría e investigación de tecnología de la información Gartner predice que, para 2025, al menos el 75 % de las organizaciones de TI enfrentarán uno o más ataques.

    Las herramientas de piratería refinadas y las estrategias de extorsión han convertido al ransomware en la mayor amenaza para la seguridad de los datos individuales, empresariales y nacionales.

    Los constantes ataques de ransomware causan grandes daños.

    Cuando ataca, roba y cifra datos valiosos.

    Los datos cifrados solo se pueden descifrar pagando un rescate a los piratas informáticos.

    Los piratas informáticos, que trabajan a través de redes oscuras, generalmente exigen Bitcoin para que el pago sea lo más difícil posible de rastrear.

    El daño que crea el ransomware es grande, al igual que las ganancias de los piratas informáticos.

    Según la consultora líder en inversiones Cybersecurity Ventures, para 2031, se espera que el ransomware ataque a una empresa, consumidor o dispositivo cada 2 segundos.

    En 2021, este número fue de solo 11 segundos.

    Incluso con esa frecuencia más baja, ese mismo año, los daños globales por ransomware alcanzaron los 20.000 millones de dólares, 61 veces más que en 2015 (325 millones de dólares).

    El rescate más grande, hasta ahora, fue de 70 millones de dólares.

    Pero, ¿los rescates resuelven el problema?

    No. Un informe de Cybereason muestra que el 49% de las empresas que pagan el rescate recuperan solo una parte de sus datos o ninguno en absoluto.

    El 80% de las empresas que pagan el rescate son atacadas por segunda vez.

    Los rescates tampoco son el único problema: el ransomware daña las marcas, provoca largas interrupciones en el servicio, expone a las empresas a responsabilidades legales y más.

    Dicho daño colateral puede ser enorme: tanto como 23 veces el rescate.

    En marzo de 2021, los piratas informáticos cifraron 15 000 dispositivos pertenecientes a una corporación de seguros.

    Gran cantidad de archivos de datos de clientes corrían el riesgo de ser filtrados.

    La empresa pagó 40 millones de dólares para recuperar los datos.

    En mayo de 2021, el ransomware detuvo todas las operaciones de un gigante de oleoductos durante 11 días.

    Los precios de la gasolina en el país subieron a su nivel más alto en siete años, lo que provocó compras de pánico.

    La empresa pagó un rescate de 4,4 millones de dólares.

    En abril de 2022, un importante fabricante de automóviles tuvo que reducir su producción anual en 500 000 vehículos tras un ataque a sus proveedores que provocó una fuga de datos de 1,4 TB.

    En mayo de 2022, dos oleadas de ataques provocaron que un país declarara una emergencia de ciberseguridad.

    Dañaron servicios básicos como la atención médica e incluso el comercio internacional.

    Hay muchos más ejemplos.

    Los piratas informáticos se dirigen a empresas e industrias grandes y de alto valor.

    El gobierno, la energía, el transporte, las finanzas, la manufactura y la atención médica son sus principales objetivos, pero nadie está a salvo.

    Tendencias de ransomware para saber Ransomware es extremadamente bueno para disfrazarse.

    Tiene muchas formas de ingresar a su sistema, por ejemplo, almacenamiento, correos electrónicos de phishing, troyanos, redes sociales e información privilegiada malintencionada.

    Es difícil de detectar y defenderse.

    Un ataque típico cifra o elimina todas las copias de datos locales e incluso puede tener como objetivo los centros de recuperación ante desastres (DR), lo que hace imposible restaurar rápidamente los datos.

    Lo que sigue, según un informe de ZDNet, es un promedio de 16 días hábiles de tiempo de inactividad del sistema.

    El coste medio de recuperación de un ataque, calculado por Sophos, es de 1,85 millones de dólares.

    Hay cuatro tendencias importantes de ransomware: Los piratas informáticos se centran en las grandes empresas y la infraestructura En lugar de lanzar campañas amplias, los ataques de ransomware ahora se centran cada vez más en objetivos de alto valor.

    La investigación que los piratas informáticos deben realizar para que este enfoque funcione es difícil y lleva mucho tiempo: ¡semanas o incluso meses!

    — y costoso, pero las ganancias potenciales hacen que valga la pena.

    Los ataques elaborados hacen que incluso las organizaciones previamente bien protegidas sean víctimas potenciales y también amenazan a los departamentos gubernamentales.

    Ransomware como servicio (RaaS) El rápido desarrollo de las tecnologías de red e información, así como las monedas digitales cifradas, ha creado un semillero para los actores malintencionados.

    Los operadores de ransomware ahora venden servicios relacionados con ransomware a otros atacantes a través de soluciones personalizadas, membresías o suscripciones.

    Esto reduce la barrera de entrada para lanzar ataques de ransomware, lo que resulta en un crecimiento explosivo de ransomware.

    La doble extorsión se convierte en el nuevo Ransomware normal no se limita a cifrar datos y exigir rescates.

    Los atacantes también roban datos y amenazan con filtrarlos.

    Incluso si una empresa tiene una copia de seguridad reciente, aún no puede correr el riesgo de una fuga de información confidencial y el subsiguiente escrutinio público y procedimientos de cumplimiento.

    Capacidades de ataque tipo APT La amenaza persistente avanzada (APT) se refiere a un ataque de red continuo y complejo personalizado por atacantes expertos para aprovechar al máximo las vulnerabilidades de la víctima.

    Los ataques de ransomware, cada vez con mayor precisión y planificación, comienzan a mostrar un gran parecido con los ataques APT.

    Necesidades de seguridad de datos El ransomware complejo plantea un gran desafío para muchas medidas de defensa actuales.

    La protección de seguridad de datos tradicional se centra en la red (como el firewall y las puertas de enlace de seguridad) y en los hosts para evitar las intrusiones de ransomware y limitar la propagación.

    Esto, sin embargo, descuida la capacidad del ransomware para disfrazarse y acechar en el sistema durante mucho tiempo para obtener permisos de acceso a un gran volumen de datos clave.

    En otras palabras, una vez que el sistema está infectado, la protección de seguridad de datos tradicional es inútil.

    Se necesita una mejor solución.

    El marco de defensa en profundidad desarrollado por el contratista de defensa Northrop Grumman brinda buenas ideas sobre cómo avanzar y construir una protección más sólida.

    Este enfoque de ciberseguridad presenta cinco capas de mecanismos defensivos: perímetro, red, punto final, aplicación y seguridad de datos.

    La protección de seguridad perimetral y de red, establecida en la capa de red, defiende mediante firewalls, sandboxes y conocimiento de la situación.

    La protección de seguridad de endpoints y aplicaciones, establecida en la capa de host, defiende mediante control de acceso, parches y auditorías de seguridad, y software antivirus.

    La última capa, la seguridad de los datos, es donde entra en juego el almacenamiento de datos.

    En la era digital moderna, el almacenamiento de datos debe hacer más que solo almacenar datos.

    Debe servir como la última línea de defensa: proteger los datos con tecnologías antimanipulación, detectar E/S anormales generadas por ransomware y evitar fugas de datos mediante tecnologías de cifrado.

    Además de todo esto, debe asegurarse de que sea posible recuperar datos limpios y no infectados manteniendo copias de datos en almacenamiento de respaldo y en una zona físicamente aislada.

    Creación de una poderosa defensa contra ransomware con almacenamiento profesional Al brindar protección doble con producción y almacenamiento de respaldo, la solución de almacenamiento con protección contra ransomware de Huawei utiliza cuatro tecnologías clave para crear una solución completa que evita que los virus se escondan, roben o manipulen los datos: detección de ransomware, antimanipulación de datos, replicación de espacio de aire y cifrado de datos de extremo a extremo.

    Echemos un vistazo a por qué la protección dual y las cuatro características clave son tan efectivas: Protección dual contra ransomware con almacenamiento principal y de respaldo En esta solución, tanto el almacenamiento primario como el de respaldo (OceanProtect Backup Storage) brindan funciones integrales de protección contra ransomware, lo que garantiza la el sistema siempre tiene una copia de datos limpia para una rápida recuperación del servicio.

    OceanProtect Backup Storage también proporciona una velocidad de recuperación ultrarrápida: hasta 172 TB/hora, cinco veces más rápido que el punto de referencia de la industria.

    Esto ayuda a las empresas a reducir drásticamente el tiempo de inactividad del servicio y las pérdidas económicas.

    Cuatro tecnologías clave para una protección integral Detección de ransomware (el ransomware no tiene dónde esconderse): la función de análisis y detección de ransomware de Huawei ofrece una precisión del 99,9 % para la producción y el almacenamiento de copias de seguridad antes, durante y después de los ataques.

    Antes de un ataque, el almacenamiento trabaja para interceptar el ransomware antes de que tenga la oportunidad de atacar.

    Si aún ocurre un ataque, el almacenamiento actúa rápidamente para proteger el sistema, trabajando con dispositivos de seguridad como firewalls para aislar los hosts que envían E/S anormales, evitando que el ransomware se propague a otros hosts.

    Después del ataque, el almacenamiento examina las copias de datos para asegurarse de que estén limpias.

    Prevención de manipulación de datos (los datos no se pueden modificar): el sistema de archivos WORM y la tecnología de instantáneas seguras bloquean la manipulación de archivos.

    El sistema WORM admite la configuración de un período de protección, evitando la modificación o eliminación de datos de producción o copia de seguridad durante el período.

    Las instantáneas seguras de solo lectura brindan una protección similar: no permiten la eliminación o modificación de datos durante un período de protección configurado.

    Aislamiento físico (las copias de datos limpios están físicamente aisladas): la tecnología Air-gap permite almacenar una copia limpia de los datos de almacenamiento de producción y respaldo en una zona físicamente aislada.

    Incluso si, por improbable que sea, tanto la producción como el almacenamiento de respaldo se ven comprometidos, la zona de aislamiento tendrá una copia limpia que se puede usar para restaurar rápidamente los servicios.

    La configuración del Acuerdo de nivel de servicio (SLA) de replicación replicará automáticamente copias de datos periódicas desde el almacenamiento de producción o respaldo al entorno de aislamiento.

    Dado que el enlace de replicación está activo solo durante la replicación, la posibilidad de que el ransomware acceda a los datos en la zona de aislamiento es relativamente baja.

    Para mayor seguridad, el almacenamiento de la zona de aislamiento también cuenta con protección de datos de múltiples capas, que admite funciones antimanipulación, como instantáneas seguras.

    Cifrado de extremo a extremo (los datos no se filtrarán): el almacenamiento de Huawei garantiza cero fugas de datos en la red de transmisión de almacenamiento y el almacenamiento a través del cifrado de: almacenamiento de protocolo, producción y respaldo, enlace de replicación de espacio aéreo y transmisión de datos de replicación remota y copias de seguridad.

    Incluso si los piratas informáticos rompen el almacenamiento o se entrometen en la red de almacenamiento, no tienen acceso a los datos confidenciales gracias a la implementación del cifrado.

    Cifrado de extremo a extremo (los datos no se filtrarán): el almacenamiento de Huawei utiliza tecnología de cifrado de extremo a extremo para garantizar que no se filtren datos en los dispositivos de almacenamiento ni en la red de transmisión de almacenamiento.

    El cifrado cubre los datos de protocolo, producción y copia de seguridad, el enlace de replicación de espacio aéreo y la replicación de datos remotos.

    Incluso si los piratas informáticos logran ingresar a un sistema, no descifrarán los datos confidenciales.

    Defensa contra el ransomware La solución de almacenamiento con protección contra ransomware de Huawei funciona las 24 horas del día, los 7 días de la semana en todo el mundo para grandes clientes de energía, finanzas, transporte, fabricación y gobierno.

    Más vale prevenir que lamentar.

    Instalar protección contra ransomware después del hecho es demasiado tarde.

    Una solución integral de almacenamiento con protección contra ransomware es la mejor manera de detener o mitigar el ransomware.

    Para obtener más información sobre cómo puede crear una defensa poderosa para sus datos, visite nuestro sitio web (https://bit.ly/3RRI74g).

  •  Some experts have said the Nigerian capital market made substantial contributions to the nation s economic growth and national development since independence in 1960 They experts spoke in separate interviews with the News Agency of Nigeria on Saturday in Lagos while reviewing the performance and evolution of the Nigerian capital market since independence Mr David Adonri Executive Vice Chairman HighCap Securities Ltd said the capital market since independence had evolved in supporting the growth and helping in unlocking economic potential for government and the populace in creating wealth Citing how the market had been beneficial to the country Adonri said the Federal Government had always financed its budget by raising capital through bonds from the Nigerian Exchange Ltd NGX According to him the capital market has also taken advantage of technology in its daily processes to increase market efficiency and help companies to raise capital while investors continued to enjoy appropriate returns on their investments Recalling how the capital market played a role during the indigenisation exercises of 1972 and 1978 he noted that the Exchange assisted Nigerians to buy over a lot of foreign enterprises an opportunity they still enjoyed to date Adonri cited how the banking industry through the Exchange in 2005 achieved its recapitalisation exercise which was mandated by the Central Bank of Nigeria CBN to shore up banks capital base from N2 billion to N25 billion In achieving the desired sustainable growth the expert said the gap in economic performance needed to be addressed Adonri however noted that the Nigerian capital market had the potential to intervene in providing solution especially in developing the foundational engineering infrastructure needed for industrialisation and ecological breakthrough Engineering infrastructure are facilities for various areas of activity servicing the economy and the population According to him Nigeria currently lacks engineering infrastructure to enable the country produce the machinery and equipment required to develop Nigerian secondary infrastructure such as roads rails ports hospitals among others He listed the engineering infrastructure to comprise technical education minning metalogical and machine making and agriculture equipment I expect that should be the area of focus for the capital market moving forward so that Nigeria will acquire the engineering infrastructure needed for industrialisation and ecological breakthrough Adonri said Malam Garba Kurfi Managing Director APT Securities coroborated Adonri s view on how the capital market has faired so far Kurfi said the over N26 trillion market capitalisation of the NGX currently above the national budget showed how positively the market had grown over years He said Today we are talking of N26 trillion market capitalisation it shows that the capital market gives Nigerians the opportunity to buy shares and own some companies for wealth creation Today we also have not just Airtel Nigeria but Airtel Africa and this means that shareholders have their shares also in the African market Dangote Group has 17 companies and it shareholders have shares in all these companies In the last 10 years five companies which are Dangote Cement Seplat MTN Airtel BUA Foods BUA Cement got listed on the Nigerian Exchange and contributed over 60 per cent of the market capitalisation According to him the percentage shows the confidence that Nigerians and the private sector have in the capital market and boosting companies willingness to get listed on the Exchange He said the capital market also assisted the Federal Inland Revenue Service FIRS in generating 50 per cent of its revenue from corporate tax paid by quoted companies Another positive development is Pension Fund that invested N14 trillion in the capital market through bonds and equities Kuffi said that might not have been possible without the support of the capital market The managing director however said the capital market could still do better especially if compared with some of its counterparts in other countries Our market capitalisation against Gross Domestic Product GDP is less than 10 per cent New York Stock Exchange s market capitalisation is over 100 per cent when compared to GDP of the U S and same with London s as well as that of Johannesburg is more than 120 per cent of the South Africa GDP However ours is just 10 per cent because big companies like NNPC NLG among others and even those in the power sector and the telcoms such as Glo 9 Mobile and Nitel are not listed Assuming all of them are listed on the exchange our market capitalisation will go up Today we already ahead of the entire budget of Nigeria he added NewsSourceCredit NAN
    Nigeria at 62: Capital market has made commendable progress – Operators
     Some experts have said the Nigerian capital market made substantial contributions to the nation s economic growth and national development since independence in 1960 They experts spoke in separate interviews with the News Agency of Nigeria on Saturday in Lagos while reviewing the performance and evolution of the Nigerian capital market since independence Mr David Adonri Executive Vice Chairman HighCap Securities Ltd said the capital market since independence had evolved in supporting the growth and helping in unlocking economic potential for government and the populace in creating wealth Citing how the market had been beneficial to the country Adonri said the Federal Government had always financed its budget by raising capital through bonds from the Nigerian Exchange Ltd NGX According to him the capital market has also taken advantage of technology in its daily processes to increase market efficiency and help companies to raise capital while investors continued to enjoy appropriate returns on their investments Recalling how the capital market played a role during the indigenisation exercises of 1972 and 1978 he noted that the Exchange assisted Nigerians to buy over a lot of foreign enterprises an opportunity they still enjoyed to date Adonri cited how the banking industry through the Exchange in 2005 achieved its recapitalisation exercise which was mandated by the Central Bank of Nigeria CBN to shore up banks capital base from N2 billion to N25 billion In achieving the desired sustainable growth the expert said the gap in economic performance needed to be addressed Adonri however noted that the Nigerian capital market had the potential to intervene in providing solution especially in developing the foundational engineering infrastructure needed for industrialisation and ecological breakthrough Engineering infrastructure are facilities for various areas of activity servicing the economy and the population According to him Nigeria currently lacks engineering infrastructure to enable the country produce the machinery and equipment required to develop Nigerian secondary infrastructure such as roads rails ports hospitals among others He listed the engineering infrastructure to comprise technical education minning metalogical and machine making and agriculture equipment I expect that should be the area of focus for the capital market moving forward so that Nigeria will acquire the engineering infrastructure needed for industrialisation and ecological breakthrough Adonri said Malam Garba Kurfi Managing Director APT Securities coroborated Adonri s view on how the capital market has faired so far Kurfi said the over N26 trillion market capitalisation of the NGX currently above the national budget showed how positively the market had grown over years He said Today we are talking of N26 trillion market capitalisation it shows that the capital market gives Nigerians the opportunity to buy shares and own some companies for wealth creation Today we also have not just Airtel Nigeria but Airtel Africa and this means that shareholders have their shares also in the African market Dangote Group has 17 companies and it shareholders have shares in all these companies In the last 10 years five companies which are Dangote Cement Seplat MTN Airtel BUA Foods BUA Cement got listed on the Nigerian Exchange and contributed over 60 per cent of the market capitalisation According to him the percentage shows the confidence that Nigerians and the private sector have in the capital market and boosting companies willingness to get listed on the Exchange He said the capital market also assisted the Federal Inland Revenue Service FIRS in generating 50 per cent of its revenue from corporate tax paid by quoted companies Another positive development is Pension Fund that invested N14 trillion in the capital market through bonds and equities Kuffi said that might not have been possible without the support of the capital market The managing director however said the capital market could still do better especially if compared with some of its counterparts in other countries Our market capitalisation against Gross Domestic Product GDP is less than 10 per cent New York Stock Exchange s market capitalisation is over 100 per cent when compared to GDP of the U S and same with London s as well as that of Johannesburg is more than 120 per cent of the South Africa GDP However ours is just 10 per cent because big companies like NNPC NLG among others and even those in the power sector and the telcoms such as Glo 9 Mobile and Nitel are not listed Assuming all of them are listed on the exchange our market capitalisation will go up Today we already ahead of the entire budget of Nigeria he added NewsSourceCredit NAN
    Nigeria at 62: Capital market has made commendable progress – Operators
    Economy4 months ago

    Nigeria at 62: Capital market has made commendable progress – Operators

    Some experts have said the Nigerian capital market made substantial contributions to the nation’s economic growth and national development since independence in 1960. They experts spoke in separate interviews with the News Agency of Nigeria on Saturday in Lagos, while reviewing the performance and evolution of the Nigerian capital market since independence.

    Mr David Adonri, Executive Vice Chairman, HighCap Securities Ltd., said the capital market, since independence, had evolved in supporting the growth and helping in unlocking economic potential for government and the populace in creating wealth.

    Citing how the market had been beneficial to the country, Adonri said the Federal Government had always financed its budget by raising capital through bonds from the Nigerian Exchange Ltd. (NGX).

    According to him, the capital market has also taken advantage of technology in its daily processes to increase market efficiency and help companies to raise capital, while investors continued to enjoy appropriate returns on their investments.

    Recalling how the capital market played a role during the indigenisation exercises of 1972 and 1978, he noted that the Exchange assisted Nigerians to buy over a lot of foreign enterprises, an opportunity they still enjoyed to date.

    Adonri cited how the banking industry through the Exchange in 2005, achieved its recapitalisation exercise, which was mandated by the Central Bank of Nigeria (CBN), to shore up banks’ capital base from N2 billion to N25 billion.

    In achieving the desired sustainable growth, the expert said the gap in economic performance needed to be addressed.

    Adonri, however, noted that the Nigerian capital market had the potential to intervene in providing solution, especially in developing the foundational engineering infrastructure needed for industrialisation and ecological breakthrough.

    Engineering infrastructure are facilities for various areas of activity servicing the economy and the population.

    According to him, Nigeria currently lacks engineering infrastructure to enable the country produce the machinery and equipment required to develop Nigerian secondary infrastructure such as roads, rails, ports, hospitals, among others.

    He listed the engineering infrastructure to comprise technical education, minning, metalogical and machine making and agriculture equipment.

    “I expect that should be the area of focus for the capital market moving forward, so that Nigeria will acquire the engineering infrastructure needed for industrialisation and ecological breakthrough,” Adonri said.

    Malam Garba Kurfi, Managing Director, APT Securities, coroborated Adonri’s view on how the capital market has faired so far.

    Kurfi said the over N26 trillion market capitalisation of the NGX, currently above the national budget, showed how positively the market had grown over years.

    He said, “Today, we are talking of N26 trillion market capitalisation.

    it shows that the capital market gives Nigerians the opportunity to buy shares and own some companies for wealth creation.

    “Today, we also have not just Airtel Nigeria, but Airtel Africa and this means that shareholders have their shares also in the African market.

    Dangote Group has 17 companies and it shareholders have shares in all these companies.

    “In the last 10 years, five companies which are Dangote Cement, Seplat, MTN, Airtel, BUA Foods, BUA Cement got listed on the Nigerian Exchange and contributed over 60 per cent of the market capitalisation.

    ” According to him, the percentage shows the confidence that Nigerians and the private sector have in the capital market and boosting companies’ willingness to get listed on the Exchange.

    He said the capital market also assisted the Federal Inland Revenue Service (FIRS) in generating 50 per cent of its revenue from corporate tax paid by quoted companies.

    Another positive development is Pension Fund that invested N14 trillion in the capital market through bonds and equities.

    Kuffi said that might not have been possible without the support of the capital market.

    The managing director, however, said the capital market could still do better, especially if compared with some of its counterparts in other countries.

    “Our market capitalisation against Gross Domestic Product(GDP) is less than 10 per cent.

    “New York Stock Exchange’s market capitalisation is over 100 per cent when compared to GDP of the U.

    S and same with London’s as well as that of Johannesburg is more than 120 per cent of the South Africa GDP.

    “However, ours is just 10 per cent because big companies like NNPC, NLG, among others, and even those in the power sector and the telcoms such as Glo, 9 Mobile and Nitel are not listed.

    “Assuming all of them are listed on the exchange, our market capitalisation will go up.

    Today we already ahead of the entire budget of Nigeria,” he added.


    NewsSourceCredit: NAN

  •   According to the Kaspersky Digital Payments Survey www Kaspersky co za 61 of Nigerian respondents encountered phishing scams when using online banking or mobile wallet services 67 have personally encountered fake websites and a staggering 82 have experienced scams via text or calls using social engineering When asked about awareness of threats against digital payment methods the majority of Nigerian respondents reported that they are aware of both financial phishing attacks 95 and online scams 97 78 also stated that they are aware of banking malware on PCs and mobile devices This type of malware steals money from users bank accounts However 98 think that banks and payment companies should educate users more about online threats When it comes to a list of security features consumers would like to see more of in existing banking apps and mobile wallets according to the survey results here s what matters most to them The implementation of one time passwords OTP via SMS per transaction 76 Biometric security features such as facial or fingerprint recognition 75 Two factor authentication required 64 Automated detection and intervention for fraudulent transactions 39 End to end encryption 22 Whether we re talking about the proliferation of phishing scams or mobile malware it s important to establish some basic cybersecurity standards Advanced security solutions which can filter out most generic attack vectors complemented by other preventative measures such as good cybersecurity awareness and regular password changes can help keep your financial transactions safe said Bethwel Opil Kaspersky business sales manager in Africa To help Nigerian users adopt digital payment technologies safely Kaspersky experts suggest the following Do not share your PIN password or any other financial information with anyone online or offline Avoid using public Wi Fi for online transactions Use a separate credit or debit card for online transactions Set a spending limit on the card that can help keep track of financial transactions Buy from official and trusted websites Use a trusted security solution like Kaspersky Total Security https bit ly 3b6LhSs on all your devices used for financial transactions It helps detect fraudulent or suspicious activities and checks the security of visited websites For developers banks and companies involved in the provision of digital payment services Kaspersky recommends Investing in comprehensive cybersecurity solutions that can help detect fraud at multiple levels of online payment processes and consumer touchpoints Advanced attacks by APT groups on financial institutions are also on the rise Deep visibility and threat intelligence is a must to keep customers protected and ensure business continuity Using the Kaspersky Threat Intelligence service https bit ly 3S3gy9y is useful to help your IT teams analyze and mitigate threats Conduct cyber awareness training for employees on an ongoing basis This will help employees know the red flags to look for when an organization is under attack and understand their role in protecting the organization Methodology The Kaspersky Digital Payment survey studies our interactions with online payments It also examines our attitudes towards them which are the key to understanding the factors that will further drive or slow down the adoption of this technology The study was conducted by the Toluna research agency in the Middle East Turkey South Africa and Nigeria Survey responses were collected between February and March 2022 with a total of 2 004 respondents in the countries indicated
    More than half of users in Nigeria faced phishing scams when using digital payments
      According to the Kaspersky Digital Payments Survey www Kaspersky co za 61 of Nigerian respondents encountered phishing scams when using online banking or mobile wallet services 67 have personally encountered fake websites and a staggering 82 have experienced scams via text or calls using social engineering When asked about awareness of threats against digital payment methods the majority of Nigerian respondents reported that they are aware of both financial phishing attacks 95 and online scams 97 78 also stated that they are aware of banking malware on PCs and mobile devices This type of malware steals money from users bank accounts However 98 think that banks and payment companies should educate users more about online threats When it comes to a list of security features consumers would like to see more of in existing banking apps and mobile wallets according to the survey results here s what matters most to them The implementation of one time passwords OTP via SMS per transaction 76 Biometric security features such as facial or fingerprint recognition 75 Two factor authentication required 64 Automated detection and intervention for fraudulent transactions 39 End to end encryption 22 Whether we re talking about the proliferation of phishing scams or mobile malware it s important to establish some basic cybersecurity standards Advanced security solutions which can filter out most generic attack vectors complemented by other preventative measures such as good cybersecurity awareness and regular password changes can help keep your financial transactions safe said Bethwel Opil Kaspersky business sales manager in Africa To help Nigerian users adopt digital payment technologies safely Kaspersky experts suggest the following Do not share your PIN password or any other financial information with anyone online or offline Avoid using public Wi Fi for online transactions Use a separate credit or debit card for online transactions Set a spending limit on the card that can help keep track of financial transactions Buy from official and trusted websites Use a trusted security solution like Kaspersky Total Security https bit ly 3b6LhSs on all your devices used for financial transactions It helps detect fraudulent or suspicious activities and checks the security of visited websites For developers banks and companies involved in the provision of digital payment services Kaspersky recommends Investing in comprehensive cybersecurity solutions that can help detect fraud at multiple levels of online payment processes and consumer touchpoints Advanced attacks by APT groups on financial institutions are also on the rise Deep visibility and threat intelligence is a must to keep customers protected and ensure business continuity Using the Kaspersky Threat Intelligence service https bit ly 3S3gy9y is useful to help your IT teams analyze and mitigate threats Conduct cyber awareness training for employees on an ongoing basis This will help employees know the red flags to look for when an organization is under attack and understand their role in protecting the organization Methodology The Kaspersky Digital Payment survey studies our interactions with online payments It also examines our attitudes towards them which are the key to understanding the factors that will further drive or slow down the adoption of this technology The study was conducted by the Toluna research agency in the Middle East Turkey South Africa and Nigeria Survey responses were collected between February and March 2022 with a total of 2 004 respondents in the countries indicated
    More than half of users in Nigeria faced phishing scams when using digital payments
    Africa6 months ago

    More than half of users in Nigeria faced phishing scams when using digital payments

    According to the Kaspersky Digital Payments Survey (www.Kaspersky.co.za), 61% of Nigerian respondents encountered phishing scams when using online banking or mobile wallet services.

    67% have personally encountered fake websites, and a staggering 82% have experienced scams (via text or calls) using social engineering.

    When asked about awareness of threats against digital payment methods, the majority of Nigerian respondents reported that they are aware of both financial phishing attacks (95%) and online scams (97%).

    78% also stated that they are aware of banking malware on PCs and mobile devices.

    This type of malware steals money from users' bank accounts.

    However, 98% think that banks and payment companies should educate users more about online threats.

    When it comes to a list of security features consumers would like to see more of in existing banking apps and mobile wallets, according to the survey results, here's what matters most to them: The implementation of one-time passwords (OTP) via SMS per transaction (76%) Biometric security features such as facial or fingerprint recognition (75%) Two-factor authentication required (64%) Automated detection and intervention for fraudulent transactions (39%) End-to-end encryption (22%) “ Whether we're talking about the proliferation of phishing scams or mobile malware, it's important to establish some basic cybersecurity standards.

    Advanced security solutions, which can filter out most generic attack vectors, complemented by other preventative measures such as good cybersecurity awareness and regular password changes, can help keep your financial transactions safe,” said Bethwel Opil, Kaspersky business sales manager in Africa.

    To help Nigerian users adopt digital payment technologies safely, Kaspersky experts suggest the following: Do not share your PIN, password or any other financial information with anyone online or offline.

    Avoid using public Wi-Fi for online transactions.

    Use a separate credit or debit card for online transactions.

    Set a spending limit on the card that can help keep track of financial transactions.

    Buy from official and trusted websites.

    Use a trusted security solution like Kaspersky Total Security (https://bit.ly/3b6LhSs) on all your devices used for financial transactions.

    It helps detect fraudulent or suspicious activities and checks the security of visited websites.

    For developers, banks and companies involved in the provision of digital payment services, Kaspersky recommends: Investing in comprehensive cybersecurity solutions that can help detect fraud at multiple levels of online payment processes and consumer touchpoints.

    Advanced attacks by APT groups on financial institutions are also on the rise.

    Deep visibility and threat intelligence is a must to keep customers protected and ensure business continuity.

    Using the Kaspersky Threat Intelligence service (https://bit.ly/3S3gy9y) is useful to help your IT teams analyze and mitigate threats.

    Conduct cyber awareness training for employees on an ongoing basis.

    This will help employees know the red flags to look for when an organization is under attack and understand their role in protecting the organization.

    Methodology The Kaspersky Digital Payment survey studies our interactions with online payments.

    It also examines our attitudes towards them, which are the key to understanding the factors that will further drive or slow down the adoption of this technology.

    The study was conducted by the Toluna research agency in the Middle East, Turkey, South Africa and Nigeria.

    Survey responses were collected between February and March 2022 with a total of 2,004 respondents in the countries indicated.

  •  Twenty Pension Fund Administrators PFAs met PenCom s deadline to increase their Minimum Regulatory Capital shareholders fund from N1 billion to N5 billion by April 27 Pension Commission PenCom made the declaration in a statement it issued in Lagos on Friday The News Agency of Nigeria reports that in 2021 PenCom approved recapitalisation for PFAs with a 12 month transition from April 27 2021 to April 27 2022 The commission declared then that the recapitalisation was expedient as the value of pension fund assets under management and custody had grown exponentially The assets had grown by 244 per cent from N3 trillion in 2012 when the previous recapitalisation was done to N12 29 trillion as at Dec 31 2020 The sustained growth in assets implies greater fiduciary responsibilities that require more operational capacity by the PFAs There was also an urgent need to ramp up PFAs capacity to manage the increasing number of registered contributors and value of pension fund assets in their custody PenCom explained that 10 PFAs had met the new regulatory capital requirement of N5 billion as at Dec 31 2021 while the others intensified efforts to meet the April 27 2022 deadline The commission stated that then exercise resulted in some mergers and acquisitions which led to the reduction of the number of PFAs from 22 to 20 The commission approved the acquisition of AIICO Pension Managers Ltd by FCMB Pensions Ltd and the merger between Tangerine Pensions Ltd and APT Pension Funds Managers Ltd It also approved a subsequent change of name of the merged entities to Tangerine APT Pensions Limited In addition the commission approved Norrenberger s acquisition of IEI Anchor Pension Managers Ltd after its acquisition of majority shareholding With the conclusion of the recapitalisation stakeholders particularly Retirement Savings Accounts holders should expect increased effectiveness and efficiency as well as improved service delivery from PFAs PenCom stated NAN
    20 Pension Fund Administrators meet deadline for N5bn minimum capital – PenCom
     Twenty Pension Fund Administrators PFAs met PenCom s deadline to increase their Minimum Regulatory Capital shareholders fund from N1 billion to N5 billion by April 27 Pension Commission PenCom made the declaration in a statement it issued in Lagos on Friday The News Agency of Nigeria reports that in 2021 PenCom approved recapitalisation for PFAs with a 12 month transition from April 27 2021 to April 27 2022 The commission declared then that the recapitalisation was expedient as the value of pension fund assets under management and custody had grown exponentially The assets had grown by 244 per cent from N3 trillion in 2012 when the previous recapitalisation was done to N12 29 trillion as at Dec 31 2020 The sustained growth in assets implies greater fiduciary responsibilities that require more operational capacity by the PFAs There was also an urgent need to ramp up PFAs capacity to manage the increasing number of registered contributors and value of pension fund assets in their custody PenCom explained that 10 PFAs had met the new regulatory capital requirement of N5 billion as at Dec 31 2021 while the others intensified efforts to meet the April 27 2022 deadline The commission stated that then exercise resulted in some mergers and acquisitions which led to the reduction of the number of PFAs from 22 to 20 The commission approved the acquisition of AIICO Pension Managers Ltd by FCMB Pensions Ltd and the merger between Tangerine Pensions Ltd and APT Pension Funds Managers Ltd It also approved a subsequent change of name of the merged entities to Tangerine APT Pensions Limited In addition the commission approved Norrenberger s acquisition of IEI Anchor Pension Managers Ltd after its acquisition of majority shareholding With the conclusion of the recapitalisation stakeholders particularly Retirement Savings Accounts holders should expect increased effectiveness and efficiency as well as improved service delivery from PFAs PenCom stated NAN
    20 Pension Fund Administrators meet deadline for N5bn minimum capital – PenCom
    Economy9 months ago

    20 Pension Fund Administrators meet deadline for N5bn minimum capital – PenCom

    Twenty Pension Fund Administrators (PFAs) met PenCom’s deadline to increase their Minimum Regulatory Capital (shareholders’ fund) from N1 billion to N5 billion by April 27.

    Pension Commission (PenCom) made the declaration in a statement it issued in Lagos on Friday.

    The News Agency of Nigeria reports that in 2021, PenCom approved recapitalisation for PFAs, with a 12-month transition from April 27, 2021 to April 27, 2022.

    The commission declared then that the recapitalisation was expedient as the value of pension fund assets under management and custody had grown exponentially.

    The assets had grown by 244 per cent from N3 trillion in 2012 (when the previous recapitalisation was done), to N12.29 trillion (as at Dec. 31, 2020).

    The sustained growth in assets implies greater fiduciary responsibilities that require more operational capacity by the PFAs.

    There was also an urgent need to ramp up PFAs capacity to manage the increasing number of registered contributors and value of pension fund assets in their custody.

    PenCom explained that 10 PFAs had met the new regulatory capital requirement of N5 billion as at Dec. 31, 2021, while the others intensified efforts to meet the April 27, 2022 deadline.

    The commission stated that then exercise resulted in some mergers and acquisitions, which led to the reduction of the number of PFAs from 22 to 20.

    “The commission approved the acquisition of AIICO Pension Managers Ltd. by FCMB Pensions Ltd. and the merger between Tangerine Pensions Ltd. and APT Pension Funds Managers Ltd.

    “It also approved a subsequent change of name of the merged entities to Tangerine APT Pensions Limited.

    “In addition, the commission approved Norrenberger’s acquisition of IEI-Anchor Pension Managers Ltd. after its acquisition of majority shareholding.

    “With the conclusion of the recapitalisation, stakeholders, particularly Retirement Savings Accounts holders should expect increased effectiveness and efficiency as well as improved service delivery from PFAs,’’ PenCom stated.

    (NAN)

  •   North Koreans have been banned from displaying any sign of happiness for 11 days to mark the 10th anniversary of Kim Jong il s death According to a report by The Telegraph the restrictions include an explicit ban on laughter and alcohol during the 11 day period of mourning On the exact anniversary of Kim Jong il s death December 17 North Koreans will even be banned from shopping During the period of mourning we should not drink alcohol laugh or participate in leisure activities a North Korean from the northeastern border city of Sinuiju told Radio Free Asia RFA Even if your family member dies during the grieving period he is not allowed to cry out loud and the body should be removed after it is over People cannot even celebrate their own birthday if it falls within the period of mourning Kim Jong il who ruled the kingdom from 1994 until his death from a heart attack in 2011 at the age of 69 was the father of current Supreme Leader Kim Jong un His rule coincided with one of the darkest periods in North Korean history the famine of the mid 1990s which is euphemistically known as the Arduous March Up to 3 5 million people are estimated to have died over a four year period Kim Jong Il ruled North Korea for 17 years until his death in 2011 CREDIT STR AFP Annually periods of mourning are observed for Kim Jong il and his father Kim Il sung considered the father of the nation These periods typically last ten days but an additional eleventh day has been added this year to mark a decade since the passing of Kim Jong il In the past many people who were caught drinking or intoxicated during the grieving period were arrested and treated as ideological criminals They were taken away and were never seen again said the source Police have been warned to look out for those who don t seem upset enough according to RFA citing a second source from the southwestern province of South Hwanghae From the first day of December they will have a special duty to repress those who damage the mood of the collective duel said the second source speaking anonymously It is a special one month duty for the police I heard that law enforcement officials cannot sleep at all North Koreans must also go the extra mile to care for the hungry and impoverished during this time North Korea is currently facing severe food shortages due to the coronavirus pandemic and economic sanctions raising fears of a second Hard March Residents must also work together to help the Kotjebi said the second source referring to the growing number of homeless street beggars in North Korea Social order and security must be guaranteed so companies are responsible for collecting food to deliver to residents and employees who cannot come to work due to food shortages In 2011 millions of North Koreans publicly mourned the death of Kim Jong Il CREDIT AP This year s mourning period will consist of art exhibits a commemorative concert and an exhibition of the Kimjongilia flower named after the late leader an official from the city of Tanchon told RFA However some locals have been brave enough to speak anonymously against the annual tradition saying that the period of mourning causes a significant disruption in daily life I just hope that Kim Jong il s mourning period will be shortened to one week as is Kim Il Sung s mourning period said one quoted by RFA Residents complain that the living are forced to mourn these two dead to death At the time of Kim Jong il s death images spread around the world of citizens convulsing crying and hitting the ground in mourning At the time the state run KCNA news agency said millions of North Koreans were engulfed in unspeakable sadness
    North Korea bans laughing for 11 days
      North Koreans have been banned from displaying any sign of happiness for 11 days to mark the 10th anniversary of Kim Jong il s death According to a report by The Telegraph the restrictions include an explicit ban on laughter and alcohol during the 11 day period of mourning On the exact anniversary of Kim Jong il s death December 17 North Koreans will even be banned from shopping During the period of mourning we should not drink alcohol laugh or participate in leisure activities a North Korean from the northeastern border city of Sinuiju told Radio Free Asia RFA Even if your family member dies during the grieving period he is not allowed to cry out loud and the body should be removed after it is over People cannot even celebrate their own birthday if it falls within the period of mourning Kim Jong il who ruled the kingdom from 1994 until his death from a heart attack in 2011 at the age of 69 was the father of current Supreme Leader Kim Jong un His rule coincided with one of the darkest periods in North Korean history the famine of the mid 1990s which is euphemistically known as the Arduous March Up to 3 5 million people are estimated to have died over a four year period Kim Jong Il ruled North Korea for 17 years until his death in 2011 CREDIT STR AFP Annually periods of mourning are observed for Kim Jong il and his father Kim Il sung considered the father of the nation These periods typically last ten days but an additional eleventh day has been added this year to mark a decade since the passing of Kim Jong il In the past many people who were caught drinking or intoxicated during the grieving period were arrested and treated as ideological criminals They were taken away and were never seen again said the source Police have been warned to look out for those who don t seem upset enough according to RFA citing a second source from the southwestern province of South Hwanghae From the first day of December they will have a special duty to repress those who damage the mood of the collective duel said the second source speaking anonymously It is a special one month duty for the police I heard that law enforcement officials cannot sleep at all North Koreans must also go the extra mile to care for the hungry and impoverished during this time North Korea is currently facing severe food shortages due to the coronavirus pandemic and economic sanctions raising fears of a second Hard March Residents must also work together to help the Kotjebi said the second source referring to the growing number of homeless street beggars in North Korea Social order and security must be guaranteed so companies are responsible for collecting food to deliver to residents and employees who cannot come to work due to food shortages In 2011 millions of North Koreans publicly mourned the death of Kim Jong Il CREDIT AP This year s mourning period will consist of art exhibits a commemorative concert and an exhibition of the Kimjongilia flower named after the late leader an official from the city of Tanchon told RFA However some locals have been brave enough to speak anonymously against the annual tradition saying that the period of mourning causes a significant disruption in daily life I just hope that Kim Jong il s mourning period will be shortened to one week as is Kim Il Sung s mourning period said one quoted by RFA Residents complain that the living are forced to mourn these two dead to death At the time of Kim Jong il s death images spread around the world of citizens convulsing crying and hitting the ground in mourning At the time the state run KCNA news agency said millions of North Koreans were engulfed in unspeakable sadness
    North Korea bans laughing for 11 days
    Headlines1 year ago

    North Korea bans laughing for 11 days

    North Koreans have been banned from displaying any sign of happiness for 11 days to mark the 10th anniversary of Kim Jong-il's death.

    According to a report by The Telegraph, the restrictions include an explicit ban on laughter and alcohol during the 11-day period of mourning. On the exact anniversary of Kim Jong-il's death, December 17, North Koreans will even be banned from shopping.

    "During the period of mourning, we should not drink alcohol, laugh or participate in leisure activities," a North Korean from the northeastern border city of Sinuiju told Radio Free Asia (RFA).

    “Even if your family member dies during the grieving period, he is not allowed to cry out loud and the body should be removed after it is over. People cannot even celebrate their own birthday if it falls within the period of mourning. "

    Kim Jong-il, who ruled the kingdom from 1994 until his death from a heart attack in 2011 at the age of 69, was the father of current Supreme Leader Kim Jong-un.

    His rule coincided with one of the darkest periods in North Korean history: the famine of the mid-1990s, which is euphemistically known as the "Arduous March." Up to 3.5 million people are estimated to have died over a four-year period.

    Kim Jong-Il ruled North Korea for 17 years until his death in 2011 CREDIT: STR / AFP

    Annually periods of mourning are observed for Kim Jong-il and his father Kim Il-sung, considered the father of the nation. These periods typically last ten days, but an additional eleventh day has been added this year to mark a decade since the passing of Kim Jong-il.

    “In the past, many people who were caught drinking or intoxicated during the grieving period were arrested and treated as ideological criminals. They were taken away and were never seen again, ”said the source.

    Police have been warned to look out for those who don't seem upset enough, according to RFA, citing a second source from the southwestern province of South Hwanghae.

    "From the first day of December, they will have a special duty to repress those who damage the mood of the collective duel," said the second source, speaking anonymously.

    “It is a special one-month duty for the police. I heard that law enforcement officials cannot sleep at all. "

    North Koreans must also go the extra mile to care for the hungry and impoverished during this time. North Korea is currently facing severe food shortages due to the coronavirus pandemic and economic sanctions, raising fears of a second "Hard March."

    "Residents must also work together to help the Kotjebi," said the second source, referring to the growing number of homeless street beggars in North Korea.

    "Social order and security must be guaranteed, so companies are responsible for collecting food to deliver to residents and employees who cannot come to work due to food shortages."

    In 2011, millions of North Koreans publicly mourned the death of Kim Jong-Il CREDIT: AP

    This year's mourning period will consist of art exhibits, a commemorative concert and an exhibition of the Kimjongilia flower, named after the late leader, an official from the city of Tanchon told RFA.

    However, some locals have been brave enough to speak anonymously against the annual tradition, saying that the period of mourning causes a significant disruption in daily life.

    "I just hope that Kim Jong-il's mourning period will be shortened to one week, as is Kim Il Sung's mourning period," said one quoted by RFA.

    "Residents complain that the living are forced to mourn these two dead to death."

    At the time of Kim Jong-il's death, images spread around the world of citizens convulsing, crying and hitting the ground in mourning.

    At the time, the state-run KCNA news agency said millions of North Koreans were "engulfed in unspeakable sadness."

  •   Oando Plc has officially notified Nigerian Exchange Ltd NGX of the acquisition of Dahiru Mangal s stake in the company by Leaf Investment Realtors Ltd This was contained in a statement signed by Oando s chief compliance officer and company secretary Ayotola Jagun published on the NGX on Monday In accordance with Rule 17 13 a of the Nigerian Exchange Ltd Issuer Rules we hereby announce the acquisition of Alhaji Dahiru Mangal s interest of 1 968 452 614 shares in Oando PLC by Leaf Investment Realtors Ltd Based on the above Leaf Investment Realtors Ltd now owns 15 83 percent of Oando Plc the statement said Oando had surpassed the volume of shares traded on NGX on November 22 with an exchange of 1 97 billion shares Specifically the company traded 1 97 billion shares valued at N11 83 billion in off market trading at N6 per share in eight deals The transaction was negotiated as a crossover agreement by APT Securities and Funds Ltd as buyer and seller Speaking about the transaction a broker for APT Securities and Funds Ltd who declared himself anonymous said that the transaction was part of the agreement with Ocean and Oil Development Partners Ltd with Mangal to resolve their dispute The stockbroker said that Mangal was becoming aware of all his holdings as part of an agreement under the mandate of the Securities and Exchange Commission SEC to the company to resolve all complaints that cause problems with its majority shareholder The broker said Mangal would also remove his directors both CEO Mukhtar Zubair and non executive director Bukar Goni Aji as part of the settlement agreement YAYA
    Dahiru Mangal sells off his shares at Oando
      Oando Plc has officially notified Nigerian Exchange Ltd NGX of the acquisition of Dahiru Mangal s stake in the company by Leaf Investment Realtors Ltd This was contained in a statement signed by Oando s chief compliance officer and company secretary Ayotola Jagun published on the NGX on Monday In accordance with Rule 17 13 a of the Nigerian Exchange Ltd Issuer Rules we hereby announce the acquisition of Alhaji Dahiru Mangal s interest of 1 968 452 614 shares in Oando PLC by Leaf Investment Realtors Ltd Based on the above Leaf Investment Realtors Ltd now owns 15 83 percent of Oando Plc the statement said Oando had surpassed the volume of shares traded on NGX on November 22 with an exchange of 1 97 billion shares Specifically the company traded 1 97 billion shares valued at N11 83 billion in off market trading at N6 per share in eight deals The transaction was negotiated as a crossover agreement by APT Securities and Funds Ltd as buyer and seller Speaking about the transaction a broker for APT Securities and Funds Ltd who declared himself anonymous said that the transaction was part of the agreement with Ocean and Oil Development Partners Ltd with Mangal to resolve their dispute The stockbroker said that Mangal was becoming aware of all his holdings as part of an agreement under the mandate of the Securities and Exchange Commission SEC to the company to resolve all complaints that cause problems with its majority shareholder The broker said Mangal would also remove his directors both CEO Mukhtar Zubair and non executive director Bukar Goni Aji as part of the settlement agreement YAYA
    Dahiru Mangal sells off his shares at Oando
    Headlines1 year ago

    Dahiru Mangal sells off his shares at Oando

    Oando Plc has officially notified Nigerian Exchange Ltd., NGX, of the acquisition of Dahiru Mangal's stake in the company by Leaf Investment & Realtors Ltd.

    This was contained in a statement signed by Oando's chief compliance officer and company secretary Ayotola Jagun, published on the NGX on Monday.

    “In accordance with Rule 17:13 (a) of the Nigerian Exchange Ltd. Issuer Rules, we hereby announce the acquisition of Alhaji Dahiru Mangal's interest of 1,968,452,614 shares in Oando PLC by Leaf Investment & Realtors Ltd .

    "Based on the above, Leaf Investment & Realtors Ltd. now owns 15.83 percent of Oando Plc," the statement said.

    Oando had surpassed the volume of shares traded on NGX on November 22 with an exchange of 1.97 billion shares.

    Specifically, the company traded 1.97 billion shares valued at N11.83 billion in off-market trading at N6 per share in eight deals.

    The transaction was negotiated as a crossover agreement by APT Securities and Funds Ltd. as buyer and seller.

    Speaking about the transaction, a broker for APT Securities and Funds Ltd., who declared himself anonymous, said that the transaction was part of the agreement with Ocean and Oil Development Partners Ltd. with Mangal to resolve their dispute.

    The stockbroker said that Mangal was becoming aware of all his holdings as part of an agreement under the mandate of the Securities and Exchange Commission, SEC, to the company to resolve all complaints that cause problems with its majority shareholder. .

    The broker said Mangal would also remove his directors, both CEO Mukhtar Zubair and non-executive director Bukar Goni-Aji, as part of the settlement agreement.

    YAYA

  •   Anomalous spyware attacks have huge growth potential in South Africa Kenya and Nigeria in 2022 NAIROBI Kenya November 25 2021 APO Group According to the latest Kaspersky https Kaspersky co za research on trends in the threat landscape South Africa Kenya and Nigeria are facing a dramatic change in the threat landscape While regular malware that spreads itself is declining dramatically as it is no longer effective and cannot fly under safety radars the region will see the growth of new cybercrime models in the coming year When comparing the total number of massive cyberattacks in 2021 Kaspersky security researchers noted a 7 5 decrease in Nigeria a 12 decrease in South Africa and an unprecedented 28 6 decrease in Kenya The reason for such a change was the introduction and popularization of new cybercrime models in the region with increasingly targeted cybercrime tools coupled with a long standing trend in which malware creators do not trust the technical advantage of their technologies on safety protection but on the Human Factor This has spurred the evolution of phishing schemes in 2021 In particular the region experienced a wave of bizarre spyware attacks The usual phishing spyware attack begins when attackers infect a victim by sending them an email with a malicious attachment or link to a compromised website and ends when spyware is downloaded and activated on the victim s device Having collected all the necessary data the operator usually ends the operation trying to leave the infected system unnoticed However in anomalous attacks the victim s device becomes not only a source of data but also a tool for the distribution of spyware By accessing the victim s email server malware operators use it to send phishing emails from the email address of a legitimate company In this case the anomalous spyware attacks one organization s server to collect stolen data from another organization and send more phishing emails Malware attacks have huge growth potential in South Africa Kenya and Nigeria in 2022 because unlike normal spyware the entry level for attackers who want to employ this tactic is significantly lower as in Instead of paying for their own infrastructure abusing and using the resources of the victims We see that cheaper attack methods have always been on the rise in the region and cybercriminals are quickly learning new tactics Therefore Kaspersky suggests that in the near future these countries should be prepared for such attacks says Maria Garnaeva Senior Security Researcher of the Kaspersky ICS CERT team However large scale attacks are not disappearing but transforming Garnaeva also reports widespread and large scale rogue installer campaigns in which fake pirated software sites offer malware as a service The scheme is usually as follows a user searches for a free version of an extremely popular legitimate spyware Cybercriminals offer you a fake installer that uses a black SEO technique abuse of legitimate search engines resulting in the offering of fraudulent websites in the first place As a result of running the software installer a few dozen malware samples are downloaded and installed with the aim of making infected devices part of the Glupteba botnet The entire botnet and fake installer campaign has been extremely active in South Africa in 2021 and continues to evolve yet it is hardly investigated While the Glupteba botnet appears to be a threat to consumers we are still investigating it and monitoring its behavior as some distributed malware resembles APT related samples such as Lazarus APT groups and was recently used in most DDoS attack in Russia It is too early to say with a high level of confidence but these factors may suggest that we are now entering the era where APT actors start to use existing malware distribution platforms making it difficult to attribution of such attacks and open a new similar vector to attacks on the supply chain adds Garnaeva To stay protected from these new cybercrime threats and models Kaspersky recommends the following Pay close attention and do not open any suspicious files or attachments received from unknown sources Do not download or install applications from untrusted sources Do not click on any links received from unknown sources and suspicious advertisements online Create strong passwords and don t forget to change them regularly Always install updates Some of them may contain fixes for critical security issues Ignore messages that ask to disable security systems for office software or antivirus software Use a robust security solution suitable for your type of system and devices such as Kaspersky Internet Security https bit ly 3nQQq4G or Kaspersky Security Cloud https bit ly 3nNj8U7
    South Africa, Kenya and Nigeria see a decline in common threats, but experience a massive increase in targeted malware schemes
      Anomalous spyware attacks have huge growth potential in South Africa Kenya and Nigeria in 2022 NAIROBI Kenya November 25 2021 APO Group According to the latest Kaspersky https Kaspersky co za research on trends in the threat landscape South Africa Kenya and Nigeria are facing a dramatic change in the threat landscape While regular malware that spreads itself is declining dramatically as it is no longer effective and cannot fly under safety radars the region will see the growth of new cybercrime models in the coming year When comparing the total number of massive cyberattacks in 2021 Kaspersky security researchers noted a 7 5 decrease in Nigeria a 12 decrease in South Africa and an unprecedented 28 6 decrease in Kenya The reason for such a change was the introduction and popularization of new cybercrime models in the region with increasingly targeted cybercrime tools coupled with a long standing trend in which malware creators do not trust the technical advantage of their technologies on safety protection but on the Human Factor This has spurred the evolution of phishing schemes in 2021 In particular the region experienced a wave of bizarre spyware attacks The usual phishing spyware attack begins when attackers infect a victim by sending them an email with a malicious attachment or link to a compromised website and ends when spyware is downloaded and activated on the victim s device Having collected all the necessary data the operator usually ends the operation trying to leave the infected system unnoticed However in anomalous attacks the victim s device becomes not only a source of data but also a tool for the distribution of spyware By accessing the victim s email server malware operators use it to send phishing emails from the email address of a legitimate company In this case the anomalous spyware attacks one organization s server to collect stolen data from another organization and send more phishing emails Malware attacks have huge growth potential in South Africa Kenya and Nigeria in 2022 because unlike normal spyware the entry level for attackers who want to employ this tactic is significantly lower as in Instead of paying for their own infrastructure abusing and using the resources of the victims We see that cheaper attack methods have always been on the rise in the region and cybercriminals are quickly learning new tactics Therefore Kaspersky suggests that in the near future these countries should be prepared for such attacks says Maria Garnaeva Senior Security Researcher of the Kaspersky ICS CERT team However large scale attacks are not disappearing but transforming Garnaeva also reports widespread and large scale rogue installer campaigns in which fake pirated software sites offer malware as a service The scheme is usually as follows a user searches for a free version of an extremely popular legitimate spyware Cybercriminals offer you a fake installer that uses a black SEO technique abuse of legitimate search engines resulting in the offering of fraudulent websites in the first place As a result of running the software installer a few dozen malware samples are downloaded and installed with the aim of making infected devices part of the Glupteba botnet The entire botnet and fake installer campaign has been extremely active in South Africa in 2021 and continues to evolve yet it is hardly investigated While the Glupteba botnet appears to be a threat to consumers we are still investigating it and monitoring its behavior as some distributed malware resembles APT related samples such as Lazarus APT groups and was recently used in most DDoS attack in Russia It is too early to say with a high level of confidence but these factors may suggest that we are now entering the era where APT actors start to use existing malware distribution platforms making it difficult to attribution of such attacks and open a new similar vector to attacks on the supply chain adds Garnaeva To stay protected from these new cybercrime threats and models Kaspersky recommends the following Pay close attention and do not open any suspicious files or attachments received from unknown sources Do not download or install applications from untrusted sources Do not click on any links received from unknown sources and suspicious advertisements online Create strong passwords and don t forget to change them regularly Always install updates Some of them may contain fixes for critical security issues Ignore messages that ask to disable security systems for office software or antivirus software Use a robust security solution suitable for your type of system and devices such as Kaspersky Internet Security https bit ly 3nQQq4G or Kaspersky Security Cloud https bit ly 3nNj8U7
    South Africa, Kenya and Nigeria see a decline in common threats, but experience a massive increase in targeted malware schemes
    Africa1 year ago

    South Africa, Kenya and Nigeria see a decline in common threats, but experience a massive increase in targeted malware schemes

    Anomalous spyware attacks have huge growth potential in South Africa, Kenya and Nigeria in 2022

    NAIROBI, Kenya, November 25, 2021 / APO Group / -

    According to the latest Kaspersky (https://Kaspersky.co.za/) research on trends in the threat landscape, South Africa, Kenya and Nigeria are facing a dramatic change in the threat landscape. While regular malware that spreads itself is declining dramatically, as it is no longer effective and cannot fly under safety radars, the region will see the growth of new cybercrime models in the coming year.

    When comparing the total number of massive cyberattacks in 2021, Kaspersky security researchers noted a 7.5% decrease in Nigeria, a 12% decrease in South Africa, and an unprecedented 28.6% decrease in Kenya. The reason for such a change was the introduction and popularization of new cybercrime models in the region, with increasingly targeted cybercrime tools coupled with a long-standing trend in which malware creators do not trust the technical advantage of their technologies. on safety protection, but on the Human Factor. This has spurred the evolution of phishing schemes in 2021. In particular, the region experienced a wave of "bizarre" spyware attacks.

    The usual phishing spyware attack begins when attackers infect a victim by sending them an email with a malicious attachment or link to a compromised website and ends when spyware is downloaded and activated on the victim's device. . Having collected all the necessary data, the operator usually ends the operation trying to leave the infected system unnoticed. However, in anomalous attacks, the victim's device becomes not only a source of data, but also a tool for the distribution of spyware. By accessing the victim's email server, malware operators use it to send phishing emails from the email address of a legitimate company. In this case, the anomalous spyware attacks one organization's server to collect stolen data from another organization and send more phishing emails.

    “Malware attacks have huge growth potential in South Africa, Kenya and Nigeria in 2022, because unlike normal spyware, the entry level for attackers who want to employ this tactic is significantly lower, as in Instead of paying for their own infrastructure, abusing and using the resources of the victims. We see that cheaper attack methods have always been on the rise in the region and cybercriminals are quickly learning new tactics. Therefore, Kaspersky suggests that in the near future, these countries should be prepared for such attacks ”, says Maria Garnaeva, Senior Security Researcher of the Kaspersky ICS CERT team.

    However, large-scale attacks are not disappearing, but transforming. Garnaeva also reports widespread and large-scale rogue installer campaigns, in which fake pirated software sites offer malware as a service. The scheme is usually as follows: a user searches for a free version of an extremely popular legitimate spyware. Cybercriminals offer you a fake installer that uses a 'black SEO technique' - abuse of legitimate search engines, resulting in the offering of fraudulent websites in the first place. As a result of running the software installer, a few dozen malware samples are downloaded and installed with the aim of making infected devices part of the Glupteba botnet. The entire botnet and fake installer campaign has been extremely active in South Africa in 2021 and continues to evolve, yet it is hardly investigated.

    “While the Glupteba botnet appears to be a threat to consumers, we are still investigating it and monitoring its behavior as some distributed malware resembles APT-related samples, such as Lazarus APT groups, and was recently used in most DDoS attack in Russia. . It is too early to say with a high level of confidence, but these factors may suggest that we are now entering the era where APT actors start to use existing malware distribution platforms, making it difficult to attribution of such attacks. and open a new similar vector. to attacks on the supply chain ”, adds Garnaeva.

    To stay protected from these new cybercrime threats and models, Kaspersky recommends the following:

    Pay close attention and do not open any suspicious files or attachments received from unknown sources. Do not download or install applications from untrusted sources. Do not click on any links received from unknown sources and suspicious advertisements online. Create strong passwords and don't forget to change them regularly. Always install updates. Some of them may contain fixes for critical security issues. Ignore messages that ask to disable security systems for office software or antivirus software. Use a robust security solution suitable for your type of system and devices, such as Kaspersky Internet Security (https://bit.ly/3nQQq4G) or Kaspersky Security Cloud (https://bit.ly/3nNj8U7).

  •   Trading on the Nigerian Stock Exchange opened on Monday on a positive note with business volume appreciating 1 103 94 percent due to off market trading at Oando Plc Specifically investors traded a total of 2 40 billion units valued at N16 47 billion in 4 811 deals This contrasts with 199 52 million shares worth N3 26 billion traded in 3 917 trades on Friday Transactions in Oando s shares topped the activity chart with 1 97 billion shares valued at N11 83 billion in off market trading at N6 per share in eight deals The transaction was negotiated as a crossover agreement by APT Securities and Funds Ltd as buyer and seller Speaking about the transaction a broker for APT Securities and Funds Ltd who declared himself anonymous said that the transaction was part of the agreement between Oando and Ocean and Oil Development Partners Ltd to resolve their dispute The stockbroker said that Dahiru Mangal a representative of the company was realizing all his holdings as part of the agreement in accordance with the mandate of the Securities and Exchange Commission SEC to the company to resolve all complaints that they cause problems with their majority shareholder The broker said Mangal would also retire his directors both the CEO Mukhtar Zubair and the non executive director Bukar Goni Aji as part of the settlement agreement It was followed by the Mutual Benefit Guarantee with 133 98 million shares worth N32 59 million while FBNH traded 88 66 million shares valued at N1 08 billion Guaranty Trust Holding Company GTCO traded 43 15 million shares worth N1 10 billion while Sterling Bank traded 25 49 million shares worth N37 75 million In addition the All Share Index rose a little more at 60 86 points or 0 14 percent to close at 43 260 13 from 43 199 27 reached on Friday As a result month to date and year to date earnings increased to 2 9 percent and 7 4 percent respectively Furthermore the market capitalization which opened at N22 544 billion increased by N31 billion or 0 14 percent to close at N22 575 billion The positive market performance was driven by the appreciation of prices in large and mid cap stocks that are Nestl FBN Holdings FBNH Conoil Honeywell Flour Mills and Zenith Bank This week analysts at United Capital Plc said We expect a sideways market with a bias towards the bias as we expect continued profit taking by investors on the gains of the nine month earnings season In addition market participants will be keeping an eye on the fixed income space The market closed positively with 18 winners in contrast to 16 losers Honeywell Flour Mills led the winners chart in percentage terms with 9 73 percent to close at N3 72 per share NEM Insurance came in second with 7 89 percent to close at N2 05 while FBNH was up 6 49 percent to close at N12 30 per share Oando was up 5 97 to close at N5 15 while Champion Breweries gained 3 83 to close at N2 71 per share On the other hand The Initiates Plc led the losers table in percentage terms by 9 76 percent to close at 37 000 per share UACN Property Development Company followed with 9 74 percent to close at N1 39 while FTN cocoa processors fell 9 09 to close at 40 000 per share Japaul Gold and Ventures lost 4 88 percent to close at 39 000 while Universal Insurance lost 4 76 percent to close at 20 000 per share YAYA
    Oando starts an agreement with Mangal, heads the trade in NGX
      Trading on the Nigerian Stock Exchange opened on Monday on a positive note with business volume appreciating 1 103 94 percent due to off market trading at Oando Plc Specifically investors traded a total of 2 40 billion units valued at N16 47 billion in 4 811 deals This contrasts with 199 52 million shares worth N3 26 billion traded in 3 917 trades on Friday Transactions in Oando s shares topped the activity chart with 1 97 billion shares valued at N11 83 billion in off market trading at N6 per share in eight deals The transaction was negotiated as a crossover agreement by APT Securities and Funds Ltd as buyer and seller Speaking about the transaction a broker for APT Securities and Funds Ltd who declared himself anonymous said that the transaction was part of the agreement between Oando and Ocean and Oil Development Partners Ltd to resolve their dispute The stockbroker said that Dahiru Mangal a representative of the company was realizing all his holdings as part of the agreement in accordance with the mandate of the Securities and Exchange Commission SEC to the company to resolve all complaints that they cause problems with their majority shareholder The broker said Mangal would also retire his directors both the CEO Mukhtar Zubair and the non executive director Bukar Goni Aji as part of the settlement agreement It was followed by the Mutual Benefit Guarantee with 133 98 million shares worth N32 59 million while FBNH traded 88 66 million shares valued at N1 08 billion Guaranty Trust Holding Company GTCO traded 43 15 million shares worth N1 10 billion while Sterling Bank traded 25 49 million shares worth N37 75 million In addition the All Share Index rose a little more at 60 86 points or 0 14 percent to close at 43 260 13 from 43 199 27 reached on Friday As a result month to date and year to date earnings increased to 2 9 percent and 7 4 percent respectively Furthermore the market capitalization which opened at N22 544 billion increased by N31 billion or 0 14 percent to close at N22 575 billion The positive market performance was driven by the appreciation of prices in large and mid cap stocks that are Nestl FBN Holdings FBNH Conoil Honeywell Flour Mills and Zenith Bank This week analysts at United Capital Plc said We expect a sideways market with a bias towards the bias as we expect continued profit taking by investors on the gains of the nine month earnings season In addition market participants will be keeping an eye on the fixed income space The market closed positively with 18 winners in contrast to 16 losers Honeywell Flour Mills led the winners chart in percentage terms with 9 73 percent to close at N3 72 per share NEM Insurance came in second with 7 89 percent to close at N2 05 while FBNH was up 6 49 percent to close at N12 30 per share Oando was up 5 97 to close at N5 15 while Champion Breweries gained 3 83 to close at N2 71 per share On the other hand The Initiates Plc led the losers table in percentage terms by 9 76 percent to close at 37 000 per share UACN Property Development Company followed with 9 74 percent to close at N1 39 while FTN cocoa processors fell 9 09 to close at 40 000 per share Japaul Gold and Ventures lost 4 88 percent to close at 39 000 while Universal Insurance lost 4 76 percent to close at 20 000 per share YAYA
    Oando starts an agreement with Mangal, heads the trade in NGX
    Headlines1 year ago

    Oando starts an agreement with Mangal, heads the trade in NGX

    Trading on the Nigerian Stock Exchange opened on Monday on a positive note, with business volume appreciating 1,103.94 percent due to off-market trading at Oando Plc.

    Specifically, investors traded a total of 2.40 billion units valued at N16.47 billion in 4,811 deals.

    This contrasts with 199.52 million shares worth N3.26 billion traded in 3,917 trades on Friday.

    Transactions in Oando's shares topped the activity chart with 1.97 billion shares valued at N11.83 billion in off-market trading at N6 per share in eight deals.

    The transaction was negotiated as a crossover agreement by APT Securities and Funds Ltd. as buyer and seller.

    Speaking about the transaction, a broker for APT Securities and Funds Ltd., who declared himself anonymous, said that the transaction was part of the agreement between Oando and Ocean and Oil Development Partners Ltd. to resolve their dispute.

    The stockbroker said that Dahiru Mangal, a representative of the company, was realizing all his holdings as part of the agreement in accordance with the mandate of the Securities and Exchange Commission, SEC, to the company to resolve all complaints that they cause problems with their majority shareholder.

    The broker said Mangal would also retire his directors; both the CEO, Mukhtar Zubair, and the non-executive director, Bukar Goni Aji, as part of the settlement agreement.

    It was followed by the Mutual Benefit Guarantee with 133.98 million shares worth N32.59 million, while FBNH traded 88.66 million shares valued at N1.08 billion.

    Guaranty Trust Holding Company (GTCO) traded 43.15 million shares worth N1.10 billion, while Sterling Bank traded 25.49 million shares worth N37.75 million.

    In addition, the All-Share Index rose a little more at 60.86 points or 0.14 percent to close at 43,260.13 from 43,199.27 reached on Friday.

    As a result, month-to-date and year-to-date earnings increased to 2.9 percent and 7.4 percent, respectively.

    Furthermore, the market capitalization, which opened at N22.544 billion, increased by N31 billion or 0.14 percent to close at N22.575 billion.

    The positive market performance was driven by the appreciation of prices in large and mid-cap stocks that are; Nestlé, FBN Holdings (FBNH), Conoil, Honeywell Flour Mills and Zenith Bank.

    This week, analysts at United Capital Plc said: “We expect a sideways market, with a bias towards the bias, as we expect continued profit-taking by investors on the gains of the nine-month earnings season.

    "In addition, market participants will be keeping an eye on the fixed income space."

    The market closed positively with 18 winners in contrast to 16 losers.

    Honeywell Flour Mills led the winners chart in percentage terms with 9.73 percent to close at N3.72 per share.

    NEM Insurance came in second with 7.89 percent to close at N2.05, while FBNH was up 6.49 percent to close at N12.30 per share.

    Oando was up 5.97% to close at N5.15, while Champion Breweries gained 3.83% to close at N2.71 per share.

    On the other hand, The Initiates Plc led the losers table in percentage terms by 9.76 percent to close at 37,000 per share.

    UACN Property Development Company followed with 9.74 percent to close at N1.39, while FTN cocoa processors fell 9.09 to close at 40,000 per share.

    Japaul Gold and Ventures lost 4.88 percent to close at 39,000, while Universal Insurance lost 4.76 percent to close at 20,000 per share.

    YAYA

  •   The Nigerian Communications Commission NCC has alerted the public to the existence of yet another hacking group orchestrating cyber espionage in the African telecoms space NCC public affairs director Dr Ikechukwu Adinde said in a statement Monday in Abuja Mr Adinde said this was in line with NCC s commitment to continuously keep stakeholders in the country s telecommunications sector informed educated and protected An Iranian hacking group known as the Lyceum also known as Hexane Siamesekitten or Spirlin has been reported to target telecommunications It also targets Internet Service Providers ISPs and Ministries of Foreign Affairs MFA in Africa It s with the malware upgraded in a recent politically motivated attack geared towards cyber espionage Information on this cyberattack is contained in the latest advisory issued by the Nigerian Computer Emergency Response Team ngCERT NgCERT rated the likelihood and level of damage from the new malware as high he added He cited an advisory report as saying The hacking group is known to focus on infiltrating the networks of carriers and ISPs Mr Adide said that between July and October 2021 Lyceum was involved in attacks on ISPs and telecommunications organizations in Israel Morocco Tunisia and Saudi Arabia He explained however that the group has been linked with Advanced Persistent Threat APT to campaigns that have hit Middle Eastern oil and gas companies in the past Now the group seems to have focused on the technology sector In addition the APT is responsible for a campaign against the foreign ministry of an anonymous African government By the way attackers operate Lyceum s initial attack vectors include credential stuffing and brute force attacks So once a victim s system is compromised attackers perform surveillance on specific targets In this mode Lyceum will attempt to deploy two different types of malware Shark and Milan known together as James he said The NCC spokesperson further explained that the two pieces of malware were backdoors Shark a 32 bit executable written in C and NET They generate a configuration file for Domain Name System DNS tunneling or Hypertext Transfer Protocol HTTP C2 communications However Milan a 32 bit Remote Access RAT Trojan horse recovers the data he said He said the two were able to communicate with the group s Command and Control C2 servers Mr Adide said the APT maintains a network of C2 servers that connect to the group s backdoors made up of more than 20 domains These include six who were previously not associated with the threat actors According to reports the individual accounts of companies of interest were generally targeted Once these accounts were hacked they would be used as a springboard to launch spear phishing attacks against high level executives in an organization Mr Adinde said the reports also suggested that these attackers are not just looking for data on subscribers and connected third party companies But once compromised threat actors or their sponsors can also use these industries to monitor people of interest However he indicated that to guard against such threats the NCC has taken up the reports of ngCERT which multiply the layers of security This is in addition to the constant monitoring of the network that was required by carriers and ISPs to avoid potential attacks In particular he advised telecom consumers and the general public to ensure consistent use of firewalls software hardware and cloud firewalls Mr Adinde said individuals should enable a web application firewall to help detect and prevent attacks from web applications by inspecting HTTP traffic Install up to date antivirus programs to help detect and prevent a wide variety of malware Trojans and viruses which APT hackers will use to exploit your system Implement the use of intrusion prevention systems that monitor your network Create a secure sandboxing environment that allows you to open and run untrusted programs or code without risking harm to your operating system Make sure you are using the Virtual Private Network VPN to prevent APT hackers from easily accessing your corporate network Activate spam and malware protection for your email applications and teach your employees how to identify potentially malicious emails he said Mr Adide further insisted that for further technical assistance individuals contact ngCERT at incident cert gov ng The NCC reiterates its commitment to actively monitor and monitor the cyber activities of the sector He will always keep Nigerian telecom stakeholders informed of potential threats in cyberspace This is to ensure that the networks that provide essential services are secure and that telecommunications consumers are protected from victims of cyber attacks he said NOPE
    NCC alerts Nigerians on hacking group targeting telecoms, internet service providers
      The Nigerian Communications Commission NCC has alerted the public to the existence of yet another hacking group orchestrating cyber espionage in the African telecoms space NCC public affairs director Dr Ikechukwu Adinde said in a statement Monday in Abuja Mr Adinde said this was in line with NCC s commitment to continuously keep stakeholders in the country s telecommunications sector informed educated and protected An Iranian hacking group known as the Lyceum also known as Hexane Siamesekitten or Spirlin has been reported to target telecommunications It also targets Internet Service Providers ISPs and Ministries of Foreign Affairs MFA in Africa It s with the malware upgraded in a recent politically motivated attack geared towards cyber espionage Information on this cyberattack is contained in the latest advisory issued by the Nigerian Computer Emergency Response Team ngCERT NgCERT rated the likelihood and level of damage from the new malware as high he added He cited an advisory report as saying The hacking group is known to focus on infiltrating the networks of carriers and ISPs Mr Adide said that between July and October 2021 Lyceum was involved in attacks on ISPs and telecommunications organizations in Israel Morocco Tunisia and Saudi Arabia He explained however that the group has been linked with Advanced Persistent Threat APT to campaigns that have hit Middle Eastern oil and gas companies in the past Now the group seems to have focused on the technology sector In addition the APT is responsible for a campaign against the foreign ministry of an anonymous African government By the way attackers operate Lyceum s initial attack vectors include credential stuffing and brute force attacks So once a victim s system is compromised attackers perform surveillance on specific targets In this mode Lyceum will attempt to deploy two different types of malware Shark and Milan known together as James he said The NCC spokesperson further explained that the two pieces of malware were backdoors Shark a 32 bit executable written in C and NET They generate a configuration file for Domain Name System DNS tunneling or Hypertext Transfer Protocol HTTP C2 communications However Milan a 32 bit Remote Access RAT Trojan horse recovers the data he said He said the two were able to communicate with the group s Command and Control C2 servers Mr Adide said the APT maintains a network of C2 servers that connect to the group s backdoors made up of more than 20 domains These include six who were previously not associated with the threat actors According to reports the individual accounts of companies of interest were generally targeted Once these accounts were hacked they would be used as a springboard to launch spear phishing attacks against high level executives in an organization Mr Adinde said the reports also suggested that these attackers are not just looking for data on subscribers and connected third party companies But once compromised threat actors or their sponsors can also use these industries to monitor people of interest However he indicated that to guard against such threats the NCC has taken up the reports of ngCERT which multiply the layers of security This is in addition to the constant monitoring of the network that was required by carriers and ISPs to avoid potential attacks In particular he advised telecom consumers and the general public to ensure consistent use of firewalls software hardware and cloud firewalls Mr Adinde said individuals should enable a web application firewall to help detect and prevent attacks from web applications by inspecting HTTP traffic Install up to date antivirus programs to help detect and prevent a wide variety of malware Trojans and viruses which APT hackers will use to exploit your system Implement the use of intrusion prevention systems that monitor your network Create a secure sandboxing environment that allows you to open and run untrusted programs or code without risking harm to your operating system Make sure you are using the Virtual Private Network VPN to prevent APT hackers from easily accessing your corporate network Activate spam and malware protection for your email applications and teach your employees how to identify potentially malicious emails he said Mr Adide further insisted that for further technical assistance individuals contact ngCERT at incident cert gov ng The NCC reiterates its commitment to actively monitor and monitor the cyber activities of the sector He will always keep Nigerian telecom stakeholders informed of potential threats in cyberspace This is to ensure that the networks that provide essential services are secure and that telecommunications consumers are protected from victims of cyber attacks he said NOPE
    NCC alerts Nigerians on hacking group targeting telecoms, internet service providers
    Headlines1 year ago

    NCC alerts Nigerians on hacking group targeting telecoms, internet service providers

    The Nigerian Communications Commission, NCC, has alerted the public to the existence of yet another hacking group orchestrating cyber espionage in the African telecoms space.

    NCC public affairs director Dr Ikechukwu Adinde said in a statement Monday in Abuja.

    Mr Adinde said this was in line with NCC's commitment to continuously keep stakeholders in the country's telecommunications sector informed, educated and protected.

    “An Iranian hacking group known as the Lyceum (also known as Hexane, Siamesekitten or Spirlin), has been reported to target telecommunications.

    “It also targets Internet Service Providers (ISPs) and Ministries of Foreign Affairs (MFA) in Africa.

    “It's with the malware upgraded in a recent politically motivated attack geared towards cyber espionage.

    “Information on this cyberattack is contained in the latest advisory issued by the Nigerian Computer Emergency Response Team (ngCERT).

    “NgCERT rated the likelihood and level of damage from the new malware as high,” he added.

    He cited an advisory report as saying, "The hacking group is known to focus on infiltrating the networks of carriers and ISPs."

    Mr Adide said that between July and October 2021, Lyceum was involved in attacks on ISPs and telecommunications organizations in Israel, Morocco, Tunisia and Saudi Arabia.

    He explained, however, that the group has been linked with Advanced Persistent Threat, APT, to campaigns that have hit Middle Eastern oil and gas companies in the past.

    “Now the group seems to have focused on the technology sector.

    “In addition, the APT is responsible for a campaign against the foreign ministry of an anonymous African government.

    “By the way attackers operate, Lyceum's initial attack vectors include credential stuffing and brute force attacks.

    “So once a victim's system is compromised, attackers perform surveillance on specific targets.

    “In this mode, Lyceum will attempt to deploy two different types of malware: Shark and Milan (known together as James),” he said.

    The NCC spokesperson further explained that the two pieces of malware were backdoors, Shark, a 32-bit executable written in C # and .NET.

    “They generate a configuration file for Domain Name System (DNS) tunneling or Hypertext Transfer Protocol (HTTP) C2 communications.

    “However, Milan - a 32-bit Remote Access (RAT) Trojan horse recovers the data,” he said.

    He said the two were able to communicate with the group's Command and Control (C2) servers.

    Mr Adide said the APT maintains a network of C2 servers that connect to the group's backdoors, made up of more than 20 domains.

    “These include six who were previously not associated with the threat actors.

    “According to reports, the individual accounts of companies of interest were generally targeted.

    “Once these accounts were hacked, they would be used as a springboard to launch spear-phishing attacks against high-level executives in an organization. "

    Mr Adinde said the reports also suggested that these attackers are not just looking for data on subscribers and connected third-party companies.

    "But, once compromised, threat actors or their sponsors can also use these industries to monitor people of interest."

    However, he indicated that to guard against such threats, the NCC has taken up the reports of ngCERT which multiply the layers of security,

    This is in addition to the constant monitoring of the network that was required by carriers and ISPs to avoid potential attacks.

    In particular, he advised telecom consumers and the general public to ensure consistent use of firewalls (software, hardware and cloud firewalls).

    Mr. Adinde said individuals should enable a web application firewall to help detect and prevent attacks from web applications by inspecting HTTP traffic.

    “Install up-to-date antivirus programs to help detect and prevent a wide variety of malware, Trojans and viruses, which APT hackers will use to exploit your system.

    “Implement the use of intrusion prevention systems that monitor your network.

    “Create a secure sandboxing environment that allows you to open and run untrusted programs or code without risking harm to your operating system.

    “Make sure you are using the Virtual Private Network (VPN) to prevent APT hackers from easily accessing your corporate network.

    “Activate spam and malware protection for your email applications and teach your employees how to identify potentially malicious emails,” he said.

    Mr. Adide further insisted that, for further technical assistance, individuals contact "ngCERT at incident@cert.gov.ng".

    “The NCC reiterates its commitment to actively monitor and monitor the cyber activities of the sector.

    “He will always keep Nigerian telecom stakeholders informed of potential threats in cyberspace.

    "This is to ensure that the networks that provide essential services are secure and that telecommunications consumers are protected from victims of cyber attacks," he said.

    NOPE

naija com newspaper bet9ja mobile shop premium times hausa shortners Kwai downloader