Loading...

07 Feb 2026 02:54

Editor's Pick Media-Avataar Insights Tech & Start Up

Cyberattacks Intensify on UAE & KSA Key Industries

Positive Technologies: cyberattackers targeting telecommunications and the military-industrial complex in the Middle East

The region’s most-attacked countries are Saudi Arabia and the UAE

Positive Technologies has conducted a comprehensive research into the activities of the APT groups targeting organizations in the Middle East . The experts say that 88% of the groups under review were attacking Saudi Arabia, and the five most-attacked sectors were government agencies, manufacturing, telecommunications, the military-industrial complex, and energy. To gain initial access, malicious actors mostly sent phishing email and exploited vulnerabilities in public-facing applications.

According to the analyzed data, malicious actors’ seven key targets were Saudi Arabia (88%), the UAE (75%), Israel (63%), Jordan (56%), Egypt (50%), Kuwait (50%) and Lebanon (44%) .

“An overwhelming majority of APT groups active in the Middle East had attacked governments (94%) and industry (81%) at least once, and 69% had attacked the energy sector,” says Yana Avezova, a senior analyst with the Positive Technologies research team. “It is worth noting that government agencies were the most attractive targets for all malicious actors: in 2022–2023, these accounted for 22% of total attacks on organizations in the Middle East.”

According to the report, two of the five most-attacked sectors, targeted by half of all groups, were telecommunications and the military-industrial complex (MIC).

The Positive Technologies believe that the MIC rose to the top of the rankings due to the specific nature of the region. Compared with other regions of the world, Middle Eastern media, too, have often found themselves a target of cyberattacks and historically have ranked high on the list. Experts attribute cybercriminals’ heightened interest in the telecommunication sector to attacks by China-linked groups, as telecoms have long been one of their targets of choice.

According to the analysis by Positive Technologies, the methods of obtaining initial access varied: 69% of groups relied on phishing email campaigns, 31% exploited flaws in public-facing applications, and 19% deployed malware on industry websites.

“Complex, targeted attacks begin with reconnaissance,” says Alexander Badaev, an information security threat researcher at Positive Technologies Expert Security Center. “Attackers may conduct extensive network scanning to identify suitable targets. This gives them enough information for the initial stage of penetration. The information may include a list of applications installed on the target server and its versions containing known vulnerabilities. After reconnaissance comes the preparation of tools for the attacks. Cybercriminals may register fake domains and create email or social media accounts for spear phishing.”

According to Badayev, after successfully gaining initial access, the attackers seek to establish a foothold in the infrastructure. To do this, 69% of APT groups leveraged the task scheduler, an OS component that runs applications or scripts at a predefined time or in response to a certain event, as in the case of a campaign that targeted the UAE government, where a group named OilRig created a MicrosoftEdgeUpdateService scheduled task that ran every five minutes, launching malware. Most attackers (56%) configured malware to auto-run. A third of APT groups (31%) gained a foothold in victim companies’ systems by setting up malware to run on a certain event.

After penetrating a corporate network, attackers examine the devices they have managed to gain access to, to understand how to proceed. According to the analysis, 94% of groups looked for data on the operating system and architecture of the compromised host, and information about software versions, installed patches, and updates. A large number of groups (81%) sought to identify the users of the compromised host and find how active they are, 63% looked into processes running on the compromised hosts, and 56% searched files and directories for useful information.

It is crucial for APT groups to remain undetected in the compromised environment for as long as possible, says Positive Technologies. Adversaries employ various methods to hide traces of their presence. They typically pre-test samples of their malware and subsequently modify these to bypass antivirus detection. A common technique is to disguise malware as legitimate files or applications. Over half (56%) of APT groups removed signs of their activity by clearing event logs and network connection history, and modifying timestamps. This makes it much more difficult for cybersecurity professionals to investigate the incident.

To build effective defenses against complex targeted attacks, Positive Technologies recommends that organizations pay attention to the fundamentals of results-oriented cybersecurity, which includes the following:

• Asset management
• Incident monitoring and response
• Cybersecurity training
• Security assessments

The full list of tactics and techniques used by APT groups active in the Middle East is available in the report published on the website.

 

(Visited 67 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandstrategi cerita bermain evaluasi keuntungan berdasarkan pengalaman di mahjong wild 2 sicbo gates of olympus perihokipendekatan observatif menguji strategi bermain populer dan cuan di mahjong ways 2 pgsoft baccarat perihoki starlight princessstrategi eksperimen bermain versi perihoki yang diklaim memberi cuan pada mahjong wins 3 pragmatic blackjack sweet bonanzastrategi perihoki mengulas rtp live terbaru dan perencanaan target menang di mahjong ways 2 pgsoft roulette wild west goldpendekatan analisa rtp live sebagai topik ulasan game berdasarkan data pada mahjong wins 3 pragmatic blackjack aztec gems perihokistrategi rtp live game berbasis data dan pola umum yang sering dibahas di mahjong wild deluxe sicbo gates of olympus duta76formula menang duta76 pgsoft mahjong ways 2 baccarat hoki jepe starlight princess beruntunduta76 beri jam hoki terbaru main mahjong wins 3 pragmatic blackjack sweet bonanza bisa menang optimalritme permainan tenang menjadikan mahjong ways 2 pgsoft jadi pilihan favorit pemain perihoki roulette masa kini wild bounty hunterpendekatan permainan reflektif menjadikan mahjong wins 3 pragmatic blackjack terasa berbeda digital bagi pemain perihoki modern aztec gemsbanyak pemain menikmati mahjong wild 2 sicbo perihoki karena ritme bermain santai dan reflektif gates of olympuspengalaman reflektif santai menjadi daya tarik utama mahjong ways 2 pgsoft bagi pengguna perihoki baccarat sweet bonanzasuasana bermain tenang sering dikaitkan dengan pengalaman perihoki mahjong wins 3 pragmatic blackjack digital perihoki stabil lucky nekopendekatan santai dalam bermain dampaknya terhadap konsistensi rtp live pada mahjong ways 2 pgsoft roulette wild west gold duta76duta76 membedah pola berpikir pada permainan mahjong wins 3 pragmatic blackjack analisa psikologi rasional wild bounty hunterdinamika strategi mahjong ways 2 scatter emas alur barueksplorasi metode bermain santai rtp 9 juta medialaporan analitik capaian 56 juta pola bermain konsistenmekanisme transisi scatter wild stabilitas pola mahjong ways 2integrasi strategi mahjong wins 3 scatter hitam akumulasi tinggimetodologi sinkronisasi sesi cuan 7 juta teori peluanganalisis profesional raih 15 juta data terapan strategi modernvalidasi algoritma pendukung 28 juta pola konsistensi sistemimplementasi formula manajemen risiko mahjong ways 2 konsisteninterpretasi rtp keuangan digital akurasi total kemenanganaws ambiguitas algoritma mahjong waysaws analisis pola jam pgsoftaws data analitik putaran otomatisaws irama variabilitas mahjong waysaws kajian ritme scatter nekoaws sensasi baru mahjong waysaws simetri peluang mahjong rtpaws simulasi ritme tenang mahjongaws sinyal positif sweet bonanzaaws strategi scatter pola umummahjong wild 2 menghadirkan ritme sicbo tenang berbeda dalam game gates of olympus populer masa kini duta76tempo bermain stabil memberi sensasi unik mahjong ways 2 pgsoft duta76 online digital baccarat starlight princess duta76ritme digital halus mengangkat daya tarik mahjong wins 3 pragmatic blackjack game online modern kini sweet bonanza duta76alur permainan tenang membentuk daya tarik mahjong ways 2 pgsoft roulette game digital modern kini wild west gold perihokipengalaman reflektif menjadikan mahjong wins 3 pragmatic favorit pemain blackjack online digital masa kini aztec gems perihokialur bermain reflektif serta santai menguatkan daya tarik mahjong wild deluxe perihoki dadu sicbo online gates of olympuspengalaman bermain tenang membuat mahjong ways 2 pgsoft baccarat jadi lebih diminati game digital perihoki modern kini sweet bonanzastrategi perihoki tentang pendalaman irama spin dan pembacaan momentum bermain pada mahjong wins 3 pragmatic blackjack starlight princessmahjong ways 2 dipahami sebagai permainan yang mengandalkan pola baccarat lucky neko yang sangat berirama duta76informasi dasar dari duta76 tentang fitur utama yang tersedia di mahjong wins 3 pragmatic blackjack wild bounty hunteraws evaluasi data spin pgsoftaws manifesto pola mahjong eksperimentalaws metode mood sugar mahjongaws ritual mahjong gates olympusaws teori rtp buy spintransisi visual gulungan bawa ritme baru pada mahjong ways 2 rahasia kemenangan yang mengejutkan Top