Mass media outlets and telecommunication service providers were the primary targets for cyberattacks in the first half of 2024, along with construction development companies, according to a report by Kaspersky, a global cybersecurity and digital privacy company.
The report highlights that the telecom sector faced the highest number of cyberattacks on databases and confidentiality, driven by attackers’ interest in sensitive data and the exploitation of trusted relationships. Mass media, traditionally a frequent target, and construction development firms, with their extensive use of subcontractors, also saw significant attack activity.
In Oman, the Ministry of Transport, Communications, and Information Technology (MTCIT) effectively managed over 460 cybersecurity incidents in 2023. This swift action underscores the sultanate’s commitment to protecting its digital infrastructure and maintaining cyber resilience. Oman reported 140 cases of cybercrime in 2023, up from 126 in 2022, with cases related to online content increasing to 2,686 in 2023 from 2,519 in 2022.
Kaspersky’s Managed Detection and Response (MDR) statistics for January-June 2024 reveal that there were 284 cybersecurity incidents per 10,000 systems in the telecommunications sector. Mass media companies experienced 180 attacks per 10,000 systems, followed by the construction development, food, and industrial sectors with 179, 122, and 121 incidents, respectively.
“A successful cyberattack on a telecom company could expose millions of customer records, including contact details, social security numbers, and credit card information,” said Sergey Soldatov, head of Kaspersky Managed Detection and Response. Such breaches can also exploit clients’ trusted relationships, making the telecom sector a prime target for cybercriminals.
Soldatov also noted the increasing targeting of mass media organizations, particularly during international conflicts where they play a crucial role in information warfare. Construction development firms are targeted due to their significant cash flows and reliance on subcontractors, making them vulnerable to attacks through trusted partners’ infrastructures and spear phishing.