The Top 5 Reasons Businesses Get Hacked

The Top Attacks in The World

1‘TeaBot’ or ‘Anatsa’ accounts for more than 64% of mobile banking apps, or 410 injected by this malware.

2   The second most dangerous, ‘Hydra’ hidden inside the google play store and steals your mobile phone credentials.

3 ‘Godfather’ is a banking malware which has so far targeted 400 financial companies and tries to steal money transfers

4   ‘Ransomware’ in 2022 costs banks 456 million USD. Phishing costs 2.7 billion USD and is the top challenge to the

financial industry.

5 NBC in June 2023 reported 7345 cases of data theft in Cambodia in 2021. The banking sector received 21.3%.

(Khmer Times June 6, 2023)

Average Cost and Lifecycle of a Security Breach

SA Mobile Application Secure

Scan
  1. Identify risks on your mobile application.
  2. Helps discover and fix compliance, privacy, and security issues within the development process before release of application.
  3. Regularly scanning as required to keep mobile application secure and compliant after each update.
  4. Once Yearly for regulatory compliance requirement.
Shield
  1. Provides source code level obfuscation to give unsurpassed protection.
  2. Embed robust tamper detection mechanisms and customizable defense response to prevent any attempts to attack mobile application.
  3. Report hacking and reversing attempts directly into security information and even management system for further analysis and action.
  4. Help detect and defend against device, network, phishing, and malware attacks.
  5. Helps enterprises gain runtime threat visibility and enables mobile apps to defend themselves against mobile attacks during runtime
ARM
  1. Identify abnormal and slow API operations
  2. Improves the efficiency of online troubleshooting.
  3. Automatically identify the upstream and downstream dependencies of applications.
  4. Identify performance bottlenecks and abnormal calls in the system by using the application topology.
  5. Automatically discover and monitor common web frameworks and RPC frameworks in application code.
Respond
 
  1.  PREPARE

    If an incident is suspected, the client is to:
    – Contact 24/7 notification centre.
    – Submit incident data form.
    – Monitor for further developments.

  2. IDENTIFY

    Within 6 hours:
    – Acknowledge notification; respond to customer.
    Within 6 – 48 hours
    – Ascertain event validity and severity.
    – Deploy agents) to suspected compromised endpoints.
    – Begin data collection.
    Within 48 hours:
    – Conduct preliminary analysis.
    – Define scope and assign roles.
    – Determine and communicate action plan.
    – Begin containment and remediation.

  3. CONTAIN, ERADICATE, RECOVER

    Beyond 48 hours:
    – Contain/Quarantine the incident.
    – Conduct root cause analysis.
    – Confirm/Deny data exfiltration.
    – Extended remediation.
    – Recover lost data (where possible).
    – Restore normal business operations.
    – Submit initial assessment report.

  4. LESSONS LEARNED

    Final report will cover:
    – Cause of breach
    – Methodology used.
    – Remediating actions.
    – Recommendations to improve security posture.