Computer security technology Eset reported this week about five types of cyber attacks that have the biggest impact on Latin American.
The company relied on data collected from its detection products and unveiled a list of cyber threats at the Sao Paulo Information Security Forum, held this week in Brazil.
According to Eset, fraudulent messages, also known as The most common attacks occurring in Latin America are "phishing", cyberattacking, malicious code, exploitation of vulnerability and crypto-mining or "crypto-attacking".
"We see new features that were not visible until a few months ago. They are becoming more complex"said Miguel Ángel Mendoza, researcher of Eset Latin America on new ways of cyber attacks and the latest virus families they found with.
Mendoza stressed that "phising," which in recent years was the most vulnerable malicious code in the region, Each time, it uses more complex social engineering techniques to misuse users with false messages and false representations, especially on financial issues.
According to Esset, this attack increased by 46% in the first quarter of this year compared to the previous quarter.
The list also includes extortion of computer programs, also known as ramsomware, which are programs that require economic benefits to recover data that has been hijacked.
"Malicious software", as known for malicious code, is one of the first places among the most common attacks in the region.
Daily in Eset we receive 300,000 unique versions of "malicious software" and about 300 new samples for Google's Android mobile operating system
Among the most common threats in Latin America is cryptojacking, which is translated in Spanish as a cryptographic contract, chasing user resources for processing virtual currencies.
"It's enough to visit the site that you want to influence", said Mendoza, who emphasized that the so-called "JS / CoinMiner", one of these cryptoid miners, was the most detected threat in the world between December 2017 and June 2018.
"Haand to clarify that it is only for some (current computer viruses). These are the ones that remain the latest here and those that are increasingly complicated and sophisticated. Therefore, today's visualization of security technology – in the region – should be completed by the engineer in his presentation.
MANUFACTURE OF TECHNOLOGY
* With EFE