Scroll Top

ASEAN Country Reports

2020

As more countries rely on digital economies, there needs to be an increased focus on the safety, reliability and trust of critical infrastructure. Over time, attacks have increased in size, sophistication, and impact. Perpetrators of these attacks have ranged from individuals to nation states. The dynamic and evolving nature of attacks continues to pose a risk of economic damage as a looming threat.

High-impact attacks include botnets for hire that can, for example, be used to conduct a large- scale amplification Distributed Denial of Service (DDoS) attack which makes use of unmanaged Internet services. Many financial institutions around the world have seen an increase in DDoS activities disrupt trading and other financial services. Not only should a country be concerned about being a recipient of such destructive DDoS attacks, they should also be concerned about whether their countries’ computers are being utilized to help launch these destructive attacks.

Email and phishing scams are also growing in numbers and sophistication. Many fake emails use lookalike domains for an organization (e.g. er1a instead of eria), and can seem very realistic. These fake emails could then be used to gain access to critical documents from coworkers, or falsify a seemingly benign attachment which, in reality, is a link to a fraudulent site or malware that may lead to a ransomware attack.

There are also sophisticated attacks which are increasingly using a technique called “route hijacking” to instigate fraud and cause economic harm. One such widely publicized attack in April 2018 succeeded against Ethereum, where a route hijack against the Amazon Web Services DNS network resulted in a $17 million cryptocurrency heist.

Targets of large-scale Internet attacks face the risk of reputational and economic damage.

To limit the exposure of such reputational or economic harm, the risks and potential attack vectors need to be understood so that proactive measures can be put in place.

Having a comprehensive understanding of what the current state of resiliency against attacks and proactive mitigation measures are makes it easier to determine where added national policies and capacity building measures may be needed. A data-driven, proactive approach to ascertain where increasing incentives for added resiliency measures may be useful, and creating reliable measurable metrics for continued risk assessment, is necessary.

This report is an initial step at showing the value of data measurements and analytics by reporting on the risks associated with open services, email infrastructure, and routing infrastructure in the 10 ASEAN member states.

ASEAN Country Reports

2020

As more countries rely on digital economies, there needs to be an increased focus on the safety, reliability and trust of critical infrastructure. Over time, attacks have increased in size, sophistication, and impact. Perpetrators of these attacks have ranged from individuals to nation states. The dynamic and evolving nature of attacks continues to pose a risk of economic damage as a looming threat.

High-impact attacks include botnets for hire that can, for example, be used to conduct a large- scale amplification Distributed Denial of Service (DDoS) attack which makes use of unmanaged Internet services. Many financial institutions around the world have seen an increase in DDoS activities disrupt trading and other financial services. Not only should a country be concerned about being a recipient of such destructive DDoS attacks, they should also be concerned about whether their countries’ computers are being utilized to help launch these destructive attacks.

Email and phishing scams are also growing in numbers and sophistication. Many fake emails use lookalike domains for an organization (e.g. er1a instead of eria), and can seem very realistic. These fake emails could then be used to gain access to critical documents from coworkers, or falsify a seemingly benign attachment which, in reality, is a link to a fraudulent site or malware that may lead to a ransomware attack.

There are also sophisticated attacks which are increasingly using a technique called “route hijacking” to instigate fraud and cause economic harm. One such widely publicized attack in April 2018 succeeded against Ethereum, where a route hijack against the Amazon Web Services DNS network resulted in a $17 million cryptocurrency heist.

Targets of large-scale Internet attacks face the risk of reputational and economic damage.

To limit the exposure of such reputational or economic harm, the risks and potential attack vectors need to be understood so that proactive measures can be put in place.

Having a comprehensive understanding of what the current state of resiliency against attacks and proactive mitigation measures are makes it easier to determine where added national policies and capacity building measures may be needed. A data-driven, proactive approach to ascertain where increasing incentives for added resiliency measures may be useful, and creating reliable measurable metrics for continued risk assessment, is necessary.

This report is an initial step at showing the value of data measurements and analytics by reporting on the risks associated with open services, email infrastructure, and routing infrastructure in the 10 ASEAN member states.

ASEAN Country Reports

2020

As more countries rely on digital economies, there needs to be an increased focus on the safety, reliability and trust of critical infrastructure. Over time, attacks have increased in size, sophistication, and impact. Perpetrators of these attacks have ranged from individuals to nation states. The dynamic and evolving nature of attacks continues to pose a risk of economic damage as a looming threat.

High-impact attacks include botnets for hire that can, for example, be used to conduct a large- scale amplification Distributed Denial of Service (DDoS) attack which makes use of unmanaged Internet services. Many financial institutions around the world have seen an increase in DDoS activities disrupt trading and other financial services. Not only should a country be concerned about being a recipient of such destructive DDoS attacks, they should also be concerned about whether their countries’ computers are being utilized to help launch these destructive attacks.

Email and phishing scams are also growing in numbers and sophistication. Many fake emails use lookalike domains for an organization (e.g. er1a instead of eria), and can seem very realistic. These fake emails could then be used to gain access to critical documents from coworkers, or falsify a seemingly benign attachment which, in reality, is a link to a fraudulent site or malware that may lead to a ransomware attack.

There are also sophisticated attacks which are increasingly using a technique called “route hijacking” to instigate fraud and cause economic harm. One such widely publicized attack in April 2018 succeeded against Ethereum, where a route hijack against the Amazon Web Services DNS network resulted in a $17 million cryptocurrency heist.

Targets of large-scale Internet attacks face the risk of reputational and economic damage.

To limit the exposure of such reputational or economic harm, the risks and potential attack vectors need to be understood so that proactive measures can be put in place.

Having a comprehensive understanding of what the current state of resiliency against attacks and proactive mitigation measures are makes it easier to determine where added national policies and capacity building measures may be needed. A data-driven, proactive approach to ascertain where increasing incentives for added resiliency measures may be useful, and creating reliable measurable metrics for continued risk assessment, is necessary.

This report is an initial step at showing the value of data measurements and analytics by reporting on the risks associated with open services, email infrastructure, and routing infrastructure in the 10 ASEAN member states.

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.

PRIVACY POLICY

CyberGreen (“us”, “we”, or “our”) operates the CyberGreen website (the “Website Service”).

This page informs you of our policies regarding the collection, use and disclosure of Personal Information when you use our Website Service.

We will not use or share your information with anyone except as described in this Privacy Policy.

We use your Personal Information for providing and improving the Website Service. By using the Website Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms of Use, accessible at https://www.cybergreen.net.

MANUAL INFORMATION COLLECTION AND USE

While using our Website Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information (“Personal Information”) may include, but is not limited to:

  • Name
  • Email address
  • Affiliation
  • Internet Protocol (“IP”) address/range (if requesting opt out from CyberGreen scans)

BROWSER INFORMATION (LOG DATA)

We collect information that your browser sends whenever you visit our Website Service (“Log Data”). This Log Data may include information such as your computer’s IP address, browser type, browser version, the pages of our Website Service that you visit, the time and date of your visit, the time spent on those pages and other statistics.

COOKIES

Cookies are files with small amounts of data, which may include an anonymous unique identifier. Cookies are sent to your browser from a web site and stored on your computer’s hard drive.

We use cookies to collect, store, and/or correlate information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Website Service.

SERVICE PROVIDERS

We may employ third-party companies and individuals to facilitate our Website Service, to provide the Website Service on our behalf, to perform Website Service-related services or to assist us in analyzing how our Website Service is used.

These third parties have access to your Personal Information only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

SECURITY

The security of your Personal Information is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security.

LINKS TO OTHER SITES

Our Website Service may contain links to other sites that are not operated by us. If you click on a third-party link, you will be directed to that third party’s site. We strongly advise you to review the Privacy Policy of every site you visit.

We have no control over, and assume no responsibility for the content, privacy policies or practices of any third-party sites or services.

CHILDREN’S PRIVACY

Our Website Service does not address anyone under the age of 18 (“Children”).

We do not knowingly collect personally identifiable information from children under 18. If you are a parent or guardian and you are aware that your child has provided us with Personal Information, please contact us. If we discover that a child under 18 has provided us with Personal Information, we will delete such information from our servers immediately.

COMPLIANCE WITH LAWS

We will disclose your Personal Information where required to do so by law or subpoena.

CHANGES TO THIS PRIVACY POLICY

We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.

You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

CONTACT US

If you have any questions about this Privacy Policy, please contact us.

TERMS OF USE

The CyberGreen Institute (“CyberGreen”) Is a non-profit, charitable organization dedicated to the creation and dissemination of metrics measuring the Cyber health of networks along with related data, metrics, and analysis. We also assist network operators with the adoption of Cyber hygiene best practices and risk remediation. A big part of our mission is the collection, calculation, and public distribution of our CyberGreen Index. The CyberGreen Index and the other data that we publish on this website is released under the Affero General Public License (version 3) (the “License”). The use of License ensures that our data remains freely accessible and freely useable by members of the public. (In rare circumstances, we may use another license to distribute data, in which case the specific data set will not be available without a click-thru notice specifying the specific license that applies.)

We do ask that you cite us properly in any academic work as the source for anything that you take from this website. If you are a commercial firm and wish to incorporate our data into a commercial product, you must acknowledge CyberGreen as the source of the data that you used and provide your customers with a link to this website with simple instructions on how to find the data that you took from our site.

We do not publish personally identifiable information (PII) or other information that implicates third party privacy rights. CyberGreen is committed to being compliant with GDPR. Our compliance efforts have been certified by the Institute for Social Internet Public Policy (ISIPP).

TERMS OF USE

The CyberGreen Institute (“CyberGreen”) Is a non-profit, charitable organization dedicated to the creation and dissemination of metrics measuring the Cyber health of networks along with related data, metrics, and analysis. We also assist network operators with the adoption of Cyber hygiene best practices and risk remediation. A big part of our mission is the collection, calculation, and public distribution of our CyberGreen Index. The CyberGreen Index and the other data that we publish on this website is released under the Affero General Public License (version 3) (the “License”). The use of License ensures that our data remains freely accessible and freely useable by members of the public. (In rare circumstances, we may use another license to distribute data, in which case the specific data set will not be available without a click-thru notice specifying the specific license that applies.)

We do ask that you cite us properly in any academic work as the source for anything that you take from this website. If you are a commercial firm and wish to incorporate our data into a commercial product, you must acknowledge CyberGreen as the source of the data that you used and provide your customers with a link to this website with simple instructions on how to find the data that you took from our site.

We do not publish personally identifiable information (PII) or other information that implicates third party privacy rights. CyberGreen is committed to being compliant with GDPR. Our compliance efforts have been certified by the Institute for Social Internet Public Policy (ISIPP).

TERMS OF USE

The CyberGreen Institute (“CyberGreen”) Is a non-profit, charitable organization dedicated to the creation and dissemination of metrics measuring the Cyber health of networks along with related data, metrics, and analysis. We also assist network operators with the adoption of Cyber hygiene best practices and risk remediation. A big part of our mission is the collection, calculation, and public distribution of our CyberGreen Index. The CyberGreen Index and the other data that we publish on this website is released under the Affero General Public License (version 3) (the “License”). The use of License ensures that our data remains freely accessible and freely useable by members of the public. (In rare circumstances, we may use another license to distribute data, in which case the specific data set will not be available without a click-thru notice specifying the specific license that applies.)

We do ask that you cite us properly in any academic work as the source for anything that you take from this website. If you are a commercial firm and wish to incorporate our data into a commercial product, you must acknowledge CyberGreen as the source of the data that you used and provide your customers with a link to this website with simple instructions on how to find the data that you took from our site.

We do not publish personally identifiable information (PII) or other information that implicates third party privacy rights. CyberGreen is committed to being compliant with GDPR. Our compliance efforts have been certified by the Institute for Social Internet Public Policy (ISIPP).