Loading...

06 Dec 2025 02:14

Editor's Pick Media-Avataar Insights Tech & Start Up

Cyberattacks Intensify on UAE & KSA Key Industries

Positive Technologies: cyberattackers targeting telecommunications and the military-industrial complex in the Middle East

The region’s most-attacked countries are Saudi Arabia and the UAE

Positive Technologies has conducted a comprehensive research into the activities of the APT groups targeting organizations in the Middle East . The experts say that 88% of the groups under review were attacking Saudi Arabia, and the five most-attacked sectors were government agencies, manufacturing, telecommunications, the military-industrial complex, and energy. To gain initial access, malicious actors mostly sent phishing email and exploited vulnerabilities in public-facing applications.

According to the analyzed data, malicious actors’ seven key targets were Saudi Arabia (88%), the UAE (75%), Israel (63%), Jordan (56%), Egypt (50%), Kuwait (50%) and Lebanon (44%) .

“An overwhelming majority of APT groups active in the Middle East had attacked governments (94%) and industry (81%) at least once, and 69% had attacked the energy sector,” says Yana Avezova, a senior analyst with the Positive Technologies research team. “It is worth noting that government agencies were the most attractive targets for all malicious actors: in 2022–2023, these accounted for 22% of total attacks on organizations in the Middle East.”

According to the report, two of the five most-attacked sectors, targeted by half of all groups, were telecommunications and the military-industrial complex (MIC).

The Positive Technologies believe that the MIC rose to the top of the rankings due to the specific nature of the region. Compared with other regions of the world, Middle Eastern media, too, have often found themselves a target of cyberattacks and historically have ranked high on the list. Experts attribute cybercriminals’ heightened interest in the telecommunication sector to attacks by China-linked groups, as telecoms have long been one of their targets of choice.

According to the analysis by Positive Technologies, the methods of obtaining initial access varied: 69% of groups relied on phishing email campaigns, 31% exploited flaws in public-facing applications, and 19% deployed malware on industry websites.

“Complex, targeted attacks begin with reconnaissance,” says Alexander Badaev, an information security threat researcher at Positive Technologies Expert Security Center. “Attackers may conduct extensive network scanning to identify suitable targets. This gives them enough information for the initial stage of penetration. The information may include a list of applications installed on the target server and its versions containing known vulnerabilities. After reconnaissance comes the preparation of tools for the attacks. Cybercriminals may register fake domains and create email or social media accounts for spear phishing.”

According to Badayev, after successfully gaining initial access, the attackers seek to establish a foothold in the infrastructure. To do this, 69% of APT groups leveraged the task scheduler, an OS component that runs applications or scripts at a predefined time or in response to a certain event, as in the case of a campaign that targeted the UAE government, where a group named OilRig created a MicrosoftEdgeUpdateService scheduled task that ran every five minutes, launching malware. Most attackers (56%) configured malware to auto-run. A third of APT groups (31%) gained a foothold in victim companies’ systems by setting up malware to run on a certain event.

After penetrating a corporate network, attackers examine the devices they have managed to gain access to, to understand how to proceed. According to the analysis, 94% of groups looked for data on the operating system and architecture of the compromised host, and information about software versions, installed patches, and updates. A large number of groups (81%) sought to identify the users of the compromised host and find how active they are, 63% looked into processes running on the compromised hosts, and 56% searched files and directories for useful information.

It is crucial for APT groups to remain undetected in the compromised environment for as long as possible, says Positive Technologies. Adversaries employ various methods to hide traces of their presence. They typically pre-test samples of their malware and subsequently modify these to bypass antivirus detection. A common technique is to disguise malware as legitimate files or applications. Over half (56%) of APT groups removed signs of their activity by clearing event logs and network connection history, and modifying timestamps. This makes it much more difficult for cybersecurity professionals to investigate the incident.

To build effective defenses against complex targeted attacks, Positive Technologies recommends that organizations pay attention to the fundamentals of results-oriented cybersecurity, which includes the following:

• Asset management
• Incident monitoring and response
• Cybersecurity training
• Security assessments

The full list of tactics and techniques used by APT groups active in the Middle East is available in the report published on the website.

 

(Visited 62 times, 1 visits today)
peri hokiperihokiduta76dsiledAt-Taujih; Jurnal Bimbingan Konseling Islamabc1131 slot viralScatter Hitamslot gacor qrisslot thailandabc1131duta 76slot qris danaabc1131 slot777 lundbergdesign.comABC1131mpo slotslot gacorMPO SLOTcleaning service bug volatility starlight baccarat abc1131 emosiburuh pelabuhan rumus free spin gates roulette abc1131 tamaktaktik main mahjong wild 2 sicbo di duta76 peluang gampang menang terbuka dengan lebarstrategi langsung jackpot scatter di mahjong ways 2 pgsoft baccarat duta76 emang gilaalgoritma paling viral panduan mudah bermain mahjong wins 3 blackjack dari duta76petualangan game paling gila di mahjong wild deluxe sicbo auto cuan besar perihokikekuatan wild mahjong ways 2 pgsoft baccarat jam gacor perihoki rtp live gampang maxwinpengalaman paling profit dari mahjong wins 3 blackjack dari perihoki tanpa pakai auto spins algoritma misterius mw2s analisis ritme reel tekniks formula menang mahjong ways 2 modals guide terbaru mw 2s menafsir gerak reels mahjong wayss menggubah kejutan mega win mahjong wayss panduan rahasia pola mahjong ways 2 modals pengurai pola scatter cara menentukans pulse reader mahjong ways 2 hitungs rahasia pola gacor mahjong ways 2 dibocorkans rumus panas teknologi ais saat alur mahjong ways berpadu dengan zenbaca rtp mahjong pemulaspam spin pak jono mahjongstrategi toni mahjong profitlangkah cerdas panji scattertaktik spam spin soniteknik baca rtp aguskejar kesempatan strategi memancing wild emas pengganda tinggi di mahjong wins3menangkan tanpa rungkad panduan anti rungkad menguasai pola tarikan liar game dan analisis cepat rtp game pgsoftobsesi animasi mahjong ways yang ubah hidup menjadi developer andalrahasia ritme stabil pattern manja baccarat casino yang mengubah cara bermainraih kemenangan maksimal dengan strategi auto gacor rahasia setting pola mudah yang terbukti ampuhdata analyst bongkar rahasia probabilitas cerdas di mahjong ways 2 strategi unggul di 2025data rtp pragmatic play rahasia zona stabil yang mengungkap kemenanganledakan inovasi pragmatic play saksikan tren utama yang menggemparkan industrirevolusi strategi mahjong pgsoft berhasil atasi deadspin pada mode regulerterungkap rahasia cara membaca pola wild dan multiplier lucky neko untuk permainan lebih terarahgelombang tipis mahjong wins 3 hancurkan simbol tengah tanpa animasi fakta mengejutkan terpantaurahasia spin digital teknik memancing fitur bonus dengan ritme spin tertenturahasia terungkap strategi sistematis menentukan momentum sweet bonzna candyland untuk mengelola risikoraih kemenangan dengan sic bo live temukan skill pengaman terbaik untuk strategi andalan andarumus rahasia main mahjong wild 2 sicbo yang dibagikan gratis oleh admin duta76duta76 fomo algoritma mahjong wins 3 scatter hitam bisa dapatkan kemenangan besar baccaratjalan menuju sukses di mahjong ways 2 pgsoft sicbo dengan gampang di perihokiperihoki bongkar rahasia mahjong wins 3 auto profit besar rtp live tertinggimontir bengkel kompresi data mahjong pgsoft abc1131 baccaratpenjual pasar malam cluster sweet bonanza abc1131 bluffing pokertukang cukur cold chip mahjong wins 3 abc1131 bahasa tubuhevaluasi strategi mahjong awsbetide inspirasi mahjong wins3ledakan profit tanpa henti terjadi saat scatter hitam mengendalikan jalannya putaran mahjong wins 3putaran mahjong wins 3 tidak pernah sama ketika scatter hitam menyulut efek keberuntungan berantaimomentum scatter wild di mahjong ways 2 menjadi titik balik menuju ledakan keuntungan besarkombinasi scatter wild mahjong ways 2 membuka jalan cepat menuju perkalian tinggi yang menguntungkanmomentum perkalian gilagilaan terjadi ketika scatter hitam muncul sebagai simbol paling menakutkanlayar mahjong wins 3 langsung bergemuruh saat scatter hitam menyalakan perkalian besar secara beruntunperan scatter wild di mahjong ways 2 hadir sebagai kunci strategis untuk meledakkan potensi profitscatter wild mahjong ways 2 menjadi pemicu awal terbukanya jalur cuan besar dalam waktu singkatketika scatter hitam turun setiap detik putaran mahjong wins 3 menjadi ajang ledakan profit tanpa batasmomen putaran mahjong wins 3 berubah dahsyat saat scatter hitam memicu gelombang cuan tanpa hentirevolusi gameplay pgsoft pangkas deadspin di mode regular mahjong Top