A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America
Abstract
:1. Introduction
2. Methodology
3. Cyberattacks in Latin America
3.1. Most Frequent Types of Attacks in the Last 5 Years
3.2. Cyberattacks in Latin American Countries
Type of Attack | How It Operates | How It Affects |
---|---|---|
Denial of Service | A Denial of Service (DoS) attack aims to overwhelm a system’s resources, rendering it unresponsive to legitimate requests. It alters DNS records to redirect traffic to a fake site, stealing sensitive data. The attacker impersonates IP addresses, seizing control of sessions between clients and servers. | The attack modifies DNS records, funnels traffic to a fraudulent site, and manipulates victim-server sessions by impersonating IP addresses. This floods the system with requests, preventing it from addressing valid demands and carrying risks, like data theft and breaches. |
Phishing | Phishing impacts the security of personal and financial information. Tricking people into revealing sensitive data, like passwords or credit card numbers, leads to identity theft, financial fraud, and unauthorized access to accounts. It can also damage the reputation of impersonated organizations, leading to a loss of customer trust. | Phishing works by sending seemingly genuine emails with misleading links to fake websites. Victims are prompted to provide personal or financial information, which is then collected by attackers. Customized messages, tailored through research, enhance the effectiveness. Phishing occurs through emails, text messages, social media, or other electronic communication channels. |
Personal | In this personal attack, exploiters manipulate system access to enact critical changes. Online harassers use digital platforms for defamation. Scammers extract bank info via deceitful calls, employing it for trickery. Attackers employ false emails for information extraction. Misuse of domains and trademarks seeks personal profit. Fake job and wage promises deceive through online resources. | Individuals can pose risks, accessing systems to make critical changes. Online harassment and slander also impact people. Scammers gather bank data through phone calls for deception. Fake emails seek information. Attackers misuse domains or trademarks for personal gain. False claims of employment and wages deceive via the internet. |
Ransomware | This malware restricts user access by blocking systems until a ransom is paid. “Ransomware-as-a-Service” facilitates fast attack creation using tools | Ransomware attacks affect victims and organizations significantly. Data restriction halts operations, affecting productivity. Victims face a dilemma: pay or risk data loss. Economic impact includes recovery costs and loss of trust. RaaS broadens risks by enabling less skilled attackers. |
Unauthorized access | Unauthorized access to information systems breaches privacy and is a necessary step in committing various cybercrimes. Many of these crimes demand private or pertinent data [18]. | Unauthorized access has significant consequences. It compromises privacy and data security for individuals and organizations. This can lead to theft of sensitive information, misuse of personal data, and potential for other cybercrimes reliant on illegally obtained information. Losing control over data can harm the reputation of involved parties and foster a climate of distrust in the online community. |
Advanced persistent threat (APT) | An APT attack is stealthy in computer networks. The attacker gains and maintains unauthorized access, going unnoticed. They monitor, intercept, and transmit sensitive data. The goal is data theft, not causing disruptions [19]. | An APT has serious consequences. It filters valuable data, exposing trade secrets, intellectual property, and personal information. It can erode trust, with legal and financial repercussions. Detecting and eliminating it is costly and time-consuming, impacting normal operations. |
Web Applications | These threats target web applications, services, or mobile apps that utilize exposed or vulnerable APIs. Common vulnerabilities, like SQL injection, cross-site scripting (XSS), and content management systems (CMS), are prevalent in web application attacks. Mitigation includes formulating security policies, using a web application firewall (WAF), vulnerability scanning, and patching [20]. | The effects of these attacks can be severe. Exploiting vulnerabilities in web applications can lead to data leaks, information theft, and compromised user accounts. This can significantly impact an organization’s reputation, user trust and potentially result in legal and financial consequences. The ongoing need to mitigate and patch against these threats can increase an organization’s workload and operational costs. |
SSL communications | The SSL/TLS protocol is widely used to ensure data security. However, its broad adoption makes it attractive for discovering and exploiting vulnerabilities that can compromise the integrity and security of information [21]. | The impact of SSL/TLS communication vulnerabilities can be significant. Exploiting these vulnerabilities could allow attackers to intercept, alter, or steal sensitive data transmitted over secure connections. This can lead to exposure of sensitive information, privacy breaches, and potential legal and financial consequences for affected organizations and users. Trust in online communication security can also be undermined, affecting the adoption and continued use of online services relying on SSL/TLS data protection. |
Zero-day | A zero-day attack aims to execute malicious code in an application or system by exploiting vulnerabilities unknown to users and product manufacturers. These unpatched vulnerabilities make them especially dangerous [22]. | Zero-day attacks have a significant impact. Exploiting unknown vulnerabilities without restrictions can lead to data theft, malware propagation, and overall system compromise. Lack of effective defenses increases risk, damaging reputation and resulting in legal liabilities for compromised data or unauthorized access. |
3.3. Cyberattacks on Public and Private Organizations in Latin America
3.4. Cyberattacks through IoT Devices
4. Vulnerabilities to Cyberattacks in Latin American Countries
4.1. Computer Vulnerabilities in Countries of the Latin American Region
4.2. Vulnerabilities by Computer Application Type
4.3. Vulnerabilities in IoT Devices
4.4. Vulnerabilities to Cyberattacks Due to Personal Factors
5. Government Response to Mitigate the Effects of Cyberattacks
6. Trends in Cybernetics Vulnerabilities
7. Discussion
8. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Section | Item | PRISMA-ScR Checklist Item | Reported on Page # |
---|---|---|---|
Title | |||
Title | 1 | Identify the report as a scoping review. | 1 |
Abstract | |||
Structured summary | 2 | Provide a structured summary that includes (as applicable): background, objectives, eligibility criteria, sources of evidence, charting methods, results, and conclusions that relate to the review questions and objectives. | 1 |
Introduction | |||
Rationale | 3 | Describe the rationale for the review in the context of what is already known. Explain why the review questions/objectives lend themselves to a scoping review approach. | 2 |
Objectives | 4 | Provide an explicit statement of the questions and objectives being addressed with reference to their key elements (e.g., population or participants, concepts, and context) or other relevant key elements used to conceptualize the review questions and/or objectives. | 2-3-4 |
Methods | |||
Protocol and registration | 5 | Indicate whether a review protocol exists; state if and where it can be accessed (e.g., a web address); and if available, provide registration information, including the registration number. | 4-7 |
Eligibility criteria | 6 | Specify characteristics of the sources of evidence used as eligibility criteria (e.g., years considered, language, and publication status) and provide a rationale. | 4 |
Information sources * | 7 | Describe all information sources in the search (e.g., databases with dates of coverage and contact with authors to identify additional sources), as well as the date the most recent search was executed. | 4 |
Search | 8 | Present the full electronic search strategy for at least one database, including any limits used, such that it could be repeated. | 3, 4 |
Selection of sources of evidence † | 9 | State the process for selecting sources of evidence (i.e., screening and eligibility) included in the scoping review. | 4 |
Data charting process ‡ | 10 | Describe the methods of charting data from the included sources of evidence (e.g., calibrated forms or forms that have been tested by the team before their use and whether data charting was performed independently or in duplicate) and any processes for obtaining and confirming data from investigators. | 3 |
Data items | 11 | List and define all variables for which data were sought and any assumptions and simplifications made. | - |
Critical appraisal of individual sources of evidence § | 12 | If performed, provide a rationale for conducting a critical appraisal of included sources of evidence; describe the methods used and how this information was used in any data synthesis (if appropriate). | - |
Synthesis of results | 13 | Describe the methods of handling and summarizing the data that were charted. | 19 |
Results | |||
Selection of sources of evidence | 14 | Give numbers of sources of evidence screened, assessed for eligibility, and included in the review, with reasons for exclusions at each stage, ideally using a flow diagram. | 19 |
Characteristics of sources of evidence | 15 | For each source of evidence, present characteristics for which data were charted and provide the citations. | - |
Critical appraisal within sources of evidence | 16 | If performed, present data on critical appraisal of included sources of evidence (see item 12). | 15, 16 |
Results of individual sources of evidence | 17 | For each included source of evidence, present the relevant data that were charted that relate to the review questions and objectives. | |
Synthesis of results | 18 | Summarize and/or present the charting results as they relate to the review questions and objectives. | |
Discussion | |||
Summary of evidence | 19 | Summarize the main results (including an overview of concepts, themes, and types of evidence available), link to the review questions and objectives, and consider the relevance to key groups. | 15 |
Limitations | 20 | Discuss the limitations of the scoping review process. | 4 |
Conclusions | 21 | Provide a general interpretation of the results with respect to the review questions and objectives, as well as potential implications and/or next steps. | 21, 22 |
Funding | |||
Funding | 22 | Describe sources of funding for the included sources of evidence, as well as sources of funding for the scoping review. Describe the role of the funders of the scoping review. | 22 |
References
- Kettani, H.; Cannistra, R.M. On Cyber Threats to Smart Digital Environments. In Proceedings of the 2nd International Conference on Smart Digital Environment, Rabat, Morocco, 18–20 October 2018; pp. 183–188. [Google Scholar] [CrossRef]
- Dave, G.; Choudhary, G.; Sihag, V.; You, I.; Choo, K.-K.R. Cyber security challenges in aviation communication, navigation, and surveillance. Comput. Secur. 2021, 112, 102516. [Google Scholar] [CrossRef]
- Parkinson, S.; Ward, P.; Wilson, K.; Miller, J. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2898–2915. [Google Scholar] [CrossRef]
- Solar, C. Cybersecurity and cyber defence in the emerging democracies. J. Cyber Policy 2020, 5, 392–412. [Google Scholar] [CrossRef]
- Toapanta, S.M.T.; Cobeña, J.D.L.; Gallegos, L.E.M. Analysis of Cyberattacks in Public Organizations in Latin America. Adv. Sci. Technol. Eng. Syst. J. 2020, 5, 116–125. [Google Scholar] [CrossRef]
- Gutierrez, L.H.; Berg, S. Telecommunications liberalization and regulatory governance: Lessons from Latin America. Telecommun. Policy 2000, 24, 865–884. [Google Scholar] [CrossRef]
- Alghazo, J.M.; Kazmi, Z.; Latif, G. Cyber security analysis of internet banking in emerging countries: User and bank perspectives. In Proceedings of the 2017 4th IEEE international conference on engineering technologies and applied sciences (ICETAS), Salmabad, Bahrain, 29 November–1 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Antonio, J.M.A. La brecha de ciberseguridad en América Latina frente al contexto global de ciberamenazas. Rev. Estud. Segur. Int. 2020, 6, 17–43. [Google Scholar] [CrossRef]
- Tricco, A.C.; Lillie, E.; Zarin, W.; O’Brien, K.K.; Colquhoun, H.; Levac, D.; Moher, D.; Peters, M.D.; Horsley, T.; Weeks, L.; et al. PRISMA Extension for Scoping Reviews (PRISMAScR): Checklist and Explanation. Ann. Intern. Med. 2018, 169, 467–473. [Google Scholar] [CrossRef] [PubMed]
- Antonio, J.M.A. Hechos ciberfísicos: Una propuesta de análisis para ciberamenazas en las Estrategias Nacionales de Ciberseguridad. Rev. Latinoam. Estud. Segur. 2019, 25, 24–40. [Google Scholar] [CrossRef]
- Pawlak, P.; Barmpaliou, P.-N. Politics of cybersecurity capacity building: Conundrum and opportunity. J. Cyber Policy 2017, 2, 123–144. [Google Scholar] [CrossRef]
- Flor, O.; Acuña, A.; Acosta-Vargas, P. Vulnerabilities Ciberdefense in Latin America, Version 1; Mendeley Data: Quito, Ecuador, 2023. [Google Scholar] [CrossRef]
- Díaz, R.M. State of Cybersecurity in Logistics in Latin America and the Caribbean. Comisiòn Económica para América Latina y el Caribe 2021. Available online: http://repositorio.cepal.org/handle/11362/47655 (accessed on 20 June 2023).
- Organization of American States. Tendencias en la Seguridad Cibernética en América Latina y el Caribe y Respuestas de los Gobiernos; Trend Micro: Hong Kong, China, 2013. [Google Scholar]
- Abu Issa, H.; Ismail, M.; Aamar, O. Unauthorized access crime in Jordanian law (comparative study). Digit. Investig. 2019, 28, 104–111. [Google Scholar] [CrossRef]
- Alshamrani, A.; Myneni, S.; Chowdhary, A.; Huang, D. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities. IEEE Commun. Surv. Tutor. 2019, 21, 1851–1877. [Google Scholar] [CrossRef]
- Delloite. COVID-19s Impact on Cybersecurity. Available online: https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html (accessed on 20 June 2023).
- Hummelholm, A. Cyber Threat Analysis in Smart City Environments. In Proceedings of the European Conference on Cyber Warfare and Security (ECCWS 2018), Oslo, Norway, 28–29 June 2018. [Google Scholar]
- Ćurguz, J. Vulnerabilities of the SSL/TLS Protocol. In Computer Science & Information Technology (CS & IT); Academy & Industry Research Collaboration Center (AIRCC): Banja Luka, Bosnia and Herzegovina, 2016; pp. 245–256. [Google Scholar]
- Hindy, H.; Atkinson, R.; Tachtatzis, C.; Colin, J.-N.; Bayne, E.; Bellekens, X. Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection. Electronics 2020, 9, 1684. [Google Scholar] [CrossRef]
- Bolgov, R. The UN and Cybersecurity Policy of Latin American Countries. In Proceedings of the 2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG), Buenos Aires, Argentina, 22–24 April 2020; pp. 259–263. [Google Scholar] [CrossRef]
- Most Targeted Countries by Cyber Attacks Latin America 2020. Statista. Available online: https://www.statista.com/statistics/818412/latin-american-countries-highest-share-cyber-attacks/ (accessed on 20 June 2023).
- Vinueza, J. Nuevo Ransomware Como Servicio. 16 May 2023. Available online: https://csirt.celec.gob.ec/en/contenidos/alertas/514-nuevo-ransomware-como-servicio-michaelkors-dirigido-a-sistemas-linux-y-vmware-esxi (accessed on 20 June 2023).
- SIM Swap Fraud Grows as the Biggest Cybersecurity Threat. Available online: https://www.dnkinfotelecom.com.br/en/sim-swap-fraud-grows-as-the-biggest-cybersecurity-threat/ (accessed on 20 June 2023).
- Toapanta, S.M.T.; Pesantes, R.P.R.; Gallegos, L.E.M. Impact of Cybersecurity Applied to IoT in Public Organizations in Latin America. In Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 27–28 July 2020; pp. 154–161. [Google Scholar] [CrossRef]
- Foldvari, A.; Biczok, G.; Kocsis, I.; Gonczy, L.; Pataricza, A. Impact Assessment of IT Security Breaches in Cyber-Physical Systems: Short paper. In Proceedings of the 2021 10th Latin-American Symposium on Dependable Computing (LADC), Florianópolis, Brazil, 22–26 November 2021; pp. 1–4. [Google Scholar] [CrossRef]
- Sancho, C. Ciberseguridad. Presentación del dossier/Cybersecurity. Introduction to Dossier. Rev. Latinoam. Estud. Segur. 2017, 20, 8–15. [Google Scholar] [CrossRef]
- 10 Most Common Types of Cyber Attacks Today—CrowdStrike. Available online: https://www.crowdstrike.com/cybersecurity-101/cyberattacks/most-common-types-of-cyberattacks/ (accessed on 20 June 2023).
- SecureSoft. Securesoft 54 Biweekly Cyber Intelligence Report. Available online: https://goo.su/HQwJ9KL (accessed on 1 June 2023).
- SecureSoft. 55 Biweekly Cyber Intelligence Report. Available online: https://goo.su/ZPfxZ (accessed on 1 June 2023).
- SecureSoft. 56 Biweekly Cyber Intelligence Report. Available online: https://goo.su/e0KFSRc (accessed on 1 June 2023).
- Donoso, M.C. Cuán importante es la seguridad cibernética para lograr la seguridad hídrica? Rev. Cienc. Ambient. 2022, 56, 284–297. [Google Scholar] [CrossRef]
- SecureSoft. 57 Biweekly Cyber Intelligence Report. Available online: https://goo.su/URUTp8 (accessed on 1 June 2023).
- SecureSoft. 58 Biweekly Cyber Intelligence Report. Available online: https://goo.su/edMq (accessed on 1 June 2023).
- SecureSoft. 59 Biweekly Cyber Intelligence Report. Available online: https://goo.su/88lxRGj (accessed on 1 June 2023).
- SecureSoft. 61 Biweekly Cyber Intelligence Report. Available online: https://goo.su/lmqjOg (accessed on 1 June 2023).
- SecureSoft. 62 Biweekly Cyber Intelligence Report. Available online: https://goo.su/tHxb (accessed on 1 June 2023).
- SecureSoft. 63 Biweekly Cyber Intelligence Report. Available online: https://goo.su/FmvR (accessed on 1 June 2023).
- SecureSoft. 64 Biweekly Cyber Intelligence Report. Available online: https://goo.su/F5FzT (accessed on 1 June 2023).
- SecureSoft. 65 Biweekly Cyber Intelligence Report. Available online: https://goo.su/zJ7v9 (accessed on 1 June 2023).
- SecureSoft. 66 Biweekly Cyber Intelligence Report. Available online: https://goo.su/PW7ipc (accessed on 1 June 2023).
- SecureSoft. 67 Biweekly Cyber Intelligence Report. Available online: https://goo.su/YzgdNK (accessed on 1 June 2023).
- SecureSoft. 68 Biweekly Cyber Intelligence Report. Available online: https://goo.su/WNTj (accessed on 1 June 2023).
- SecureSoft. 69 Biweekly Cyber Intelligence Report. Available online: https://goo.su/lgGYC19 (accessed on 1 June 2023).
- SecureSoft. 70 Biweekly Cyber Intelligence Report. Available online: https://goo.su/IQsYxN (accessed on 1 June 2023).
- SecureSoft. 71 Biweekly Cyber Intelligence Report. Available online: https://goo.su/2zJFf (accessed on 1 June 2023).
- SecureSoft. 72 Biweekly Cyber Intelligence Report. Available online: https://goo.su/nA73 (accessed on 1 June 2023).
- SecureSoft. 73 Biweekly Cyber Intelligence Report. Available online: https://shorturl.at/finB0 (accessed on 1 June 2023).
- SecureSoft. 74 Biweekly Cyber Intelligence Report. Available online: https://goo.su/7wUpBe (accessed on 1 June 2023).
- ESSET 2022. ESET-Security-Report-LATAM202. Available online: https://goo.su/AXeiDL (accessed on 15 May 2023).
- Cyberthreat Real Time. Available online: https://cybermap.kaspersky.com (accessed on 1 June 2023).
- Geluvaraj, B.; Satwik, P.M.; Kumar, T.A.A. The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace. In International Conference on Computer Networks and Communication Technologies; Smys, S., Bestak, R., Chen, J.I.-Z., Kotuliak, I., Eds.; Lecture Notes on Data Engineering and Communications Technologies; Springer: Singapore, 2019; Volume 15, pp. 739–747. [Google Scholar] [CrossRef]
- Toapanta, S.; Peñafiel, L.; Mafla, L. Prototype to Mitigate the Risks of the Integrity of Cyberattack Information in Electoral Processes in Latin America. In Proceedings of the 2019 2nd International Conference on Education Technology Management (ICETM’19), Barcelona, Spain, 18–20 December 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 111–118. [Google Scholar] [CrossRef]
- Jimenez, E.; Yepez, R.; Giraldo, J.; Rojas, I. Valley of Death: Factors Hindering the Success of Technological Innovations. Rev. CEA 2021, 7, e1926. [Google Scholar] [CrossRef]
- Kalhoro, S.; Rehman, M.; Ponnusamy, V.; Shaikh, F.B. Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review. IEEE Access 2021, 9, 99339–99363. [Google Scholar] [CrossRef]
- De Azambuja, A.J.G.; Plesker, C.; Schützer, K.; Anderl, R.; Schleich, B.; Almeida, V.R. Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey. Electronics 2023, 12, 1920. [Google Scholar] [CrossRef]
- Creado, Y.; Ramteke, V. Active cyber defence strategies and techniques for banks and financial institutions. J. Financ. Crime 2020, 27, 771–780. [Google Scholar] [CrossRef]
- Ataque del Ransomware LockBit Afectó al Poder Judicial de Chile|WeLiveSecurity. Available online: https://www.welivesecurity.com/la-es/2022/09/28/ataque-ransomware-lockbit-poder-judicial-chile/ (accessed on 20 June 2023).
- Fraud and Cybercrime in Latin America: An Evolving Threat Landscape—Blueliv.—Kippeo Technologies. Available online: https://kippeo.com/fraud-and-cybercrime-in-latin-america-an-evolving-threat-landscape-blueliv/ (accessed on 20 June 2023).
- Niño, F.Y.A. Ransomware, una amenaza latente en Latinoamérica. Intersedes 2023, 24, 92–119. [Google Scholar] [CrossRef]
- Organization of American States. Report on Cybersecurity and Critical Infrastructure in the Americas; Trend Micro: Irving, TX, USA, 2015. [Google Scholar]
- Buzzio-Garcia, J.; Salazar-Vilchez, V.; Moreno-Torres, J.; Leon-Estofanero, O. Review of Cybersecurity in Latin America during the COVID-19 Pandemic: A brief Overview. In Proceedings of the 2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM), Cuenca, Ecuador, 12–15 October 2021; pp. 1–5. [Google Scholar] [CrossRef]
- Kaur, R.; Gabrijelčič, D.; Klobučar, T. Artificial intelligence for cybersecurity: Literature review and future research directions. Inf. Fusion 2023, 97, 101804. [Google Scholar] [CrossRef]
Database | String Search | Studies Number |
---|---|---|
ACM | [Publication Title: cyber attack] OR [Publication Title: “Latin America”] AND [E-Publication Date: Past five years] | 229 |
IEEE | search: cyber attack Latin America | 7 |
Web of Science | cyber (Topic) and attack (Topic) and Latin America (Topic) | 3 |
Scopus | TITLE-ABS-KEY (cyber AND attack OR threat AND Latin AND America) | 24 |
Science Direct | Title, abstract, keywords: cyber threat Latin America | 313 |
Manual Search | search: cyber attack Latin America | 30 |
Total number of studies | 606 |
Aspect | Description |
---|---|
Countries in Latin America most targeted by cyberattacks in 2020 | As of September 2020, a significant portion of cyberattacks in the Latin American countries under scrutiny focused on Brazil, with nearly 56 percent of the attacks targeting users or infrastructures. Mexico followed closely, with approximately 28 percent of the attacks directed toward its users. Colombia took third place, which experienced over 10 percent of the cyberattacks. |
Distribution of human-initiated cyberattacks originating from Latin America in the second half of 2021 by device | In the latter half of 2021, a significant majority of human-initiated cyberattacks linked to Latin America, precisely about 72 percent, were identified as originating from mobile devices, while approximately 28 percent were reported to have developed from desktop computers. Moreover, the attack rates observed in Latin America surpassed the global average across all channels. |
The cyber-attack rate in Latin America compared to the global average in the second half of 2021 by channel | In the latter half of 2021, Latin America experienced a significantly higher incidence of cyberattacks than the global average. The rate of attacks originating from mobile browsers surpassed three percent, exceeding the worldwide average of 2.4 percent. Furthermore, the region recorded the highest rate of cyberattacks from desktop computers, reaching four percent, while the global average stood at 1.8 percent. |
Year-on-year change in the volume of cyberattacks originating in Latin America in the second half of 2021 by type | In the second half of 2021, there was a year-on-year growth of 455 percent in automated bot-driven cyberattacks from Latin America. Additionally, during the same period, there was a year-on-year growth of almost 140 percent in human-initiated attacks. Furthermore, attack rates in Latin America exceeded the global average across all channels. |
Countries and territories with the highest risk of local malware infections in Latin America in Q2 2020 | In the second quarter of 2020, approximately 26 percent of computer users in Bolivia who utilized Kaspersky Lab’s security products were targeted by local malware threats. Ecuador and Cuba followed closely, with 24.3 percent and 23.5 percent of users facing at least one regional malware threat. Furthermore, during that same period, Ecuador also ranked among the Latin American countries with a high incidence of malware attacks on mobile users. |
The proportion of internet users attacked by malware in selected Latin American countries and territories in the second quarter of 2020 | In the second quarter of 2020, around six percent of internet users in Brazil, who utilized Kaspersky Lab’s security products on their computers, experienced web-based malware attacks. On the other hand, Mexico had a 4.6 percent rate of internet users targeted by trojans during that period. Mexico also ranked third among Latin American countries, with a significant percentage of mobile users being attacked by malware. |
The proportion of mobile users attacked by malware in selected Latin American countries in the second quarter of 2020 | During the second quarter of 2020, around nine percent of mobile users in Argentina, who used Kaspersky Lab’s mobile security products, encountered malware attacks. Similarly, nearly 4.5 percent of mobile users in Peru experienced the same problem. The complete expansion of mobile internet in Latin America is anticipated to persist. |
The most common malware strains in Latin America in the first half of 2020, by a percentage of malware attacks | In the first half of 2020, Emotet stood out as Latin America’s most common type of malware. It accounted for nine percent of all malware attacks in the region. The open-source miner XMRig followed closely behind, responsible for seven percent of the detected attacks. |
Countries in Latin America and the Caribbean are the most affected by phishing attacks in 2020 | In 2020, Brazil and Venezuela had the highest number of users targeted by phishing attacks in Latin America and the Caribbean, with 19.94 percent and 16.84 percent, respectively. These phishing attacks expose users to malicious software, including ransomware, which encrypts data and demands payment for its release. Brazil also experienced the highest number of ransomware attacks among all countries in the region that year. |
Latin American countries with the highest proportion of users attacked with ransomware in 2020 | From September 2020 onwards, Brazil stood out as the country in Latin America with the highest percentage of unique users affected by ransomware, with nearly 46.7 percent of users falling victim to these attacks. Mexico followed closely behind in second place, with approximately 22.6 percent of users being targeted, while Colombia ranked third, with over eight percent of users experiencing ransomware attacks. |
Latin American countries most attacked by cyber miners in Q2 2020 | During the second quarter of 2020, Bolivia experienced the highest mining attacks among computer users who relied on Kaspersky Lab’s security products in Latin America. These attacks accounted for approximately 1.22 percent of the cases. A malicious mining attack occurs when online currency, cryptocurrency, is illicitly mined from a device. Furthermore, Bolivia also ranked as the Latin American country with the highest risk of local malware infections during that period. |
Latin American countries were the most attacked by web applications in June 2019 | Based on the recorded web application attacks in June 2019, Brazil endured the highest volume of attacks within seven days among Latin American countries. Approximately 8.3 million attacks were directed toward websites in Brazil. Argentina, taking second place, faced nearly 1.8 million attacks. |
Leading IT security incidents among Latin American companies in 2021 | According to a 2021 survey conducted among security professionals in various Latin American companies, 24 percent of the participants disclosed that their organizations had experienced malware infections. Additionally, 17 percent reported social engineering attacks, whereas 13 percent reported unauthorized access to their business applications and/or databases. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Flor-Unda, O.; Simbaña, F.; Larriva-Novo, X.; Acuña, Á.; Tipán, R.; Acosta-Vargas, P. A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America. Informatics 2023, 10, 71. https://doi.org/10.3390/informatics10030071
Flor-Unda O, Simbaña F, Larriva-Novo X, Acuña Á, Tipán R, Acosta-Vargas P. A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America. Informatics. 2023; 10(3):71. https://doi.org/10.3390/informatics10030071
Chicago/Turabian StyleFlor-Unda, Omar, Freddy Simbaña, Xavier Larriva-Novo, Ángel Acuña, Rolando Tipán, and Patricia Acosta-Vargas. 2023. "A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America" Informatics 10, no. 3: 71. https://doi.org/10.3390/informatics10030071
APA StyleFlor-Unda, O., Simbaña, F., Larriva-Novo, X., Acuña, Á., Tipán, R., & Acosta-Vargas, P. (2023). A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America. Informatics, 10(3), 71. https://doi.org/10.3390/informatics10030071