Charl van der Walt (CW): These are some of the notable observations:

  • Re-victimization: This is a trend that has emerged over the past few years that has been exacerbated by the major increase in victim count in 2023. Merely being in a list of data leak sources posted on a Dedicated Leak Site exposes organizations to multiple forms of harm. The re-victimization cycle amplifies consequences like reputational damage, increased risk of data loss, financial burden, and psychological impact. The reposting of victims on Dedicated Leak Sites is especially noticeable during police takedowns or when threat groups are disbanded.
Charl van der Walt, Head of Security Research, Orange Cyberdefense
  • An emerging pattern of victim profiles: While analysts and media will use the term “Big Game Hunting” to describe targeted and sophisticated attacks against large, high-value targets, we believe the term “harvest” more aptly describes the wanton and indiscriminate patterns we observe in our data. With very few exceptions, the simple global economic reality is that most victims are from the predominantly English-speaking countries that dominate the world economy.
  • Collapse of “moral barriers”: Traditionally, the majority of threat actors have been politically astute, practicing a kind of “anti-targeting” that sees them deliberately avoiding victims that could elicit a particularly powerful political blow-back. For instance, threat actors have largely avoided targets in the healthcare domain through the COVID-19 crisis. However, our data reveals that the healthcare and social services sector saw the largest growth in victims of any industry, recording an increase of 160% in the past 12 months. This presents a worrying trend which is, perhaps naively, unexpected. Historically, threat actors had shown some degree of “moral restraint” — publicly committing not to target specific sectors including healthcare, education, and the government sector. Now, data shows that they could be shedding the ‘moral restraint’ that they have adhered to in the past.
  • Geopolitics and hacktivism: Geopolitical tensions are expected to increase the vulnerability of the Asia Pacific region and its susceptible sectors. Hacktivism is becoming more political, potentially influencing societal perception, discourse, and policy. Countries like Australia, Indonesia, the Philippines, and Singapore are likely to be affected by these broader geopolitical trends.

Our hypothesis is that economic size, language, and business “culture” are the primary factors shaping the regional demographics of our victim dataset. These are some of the key trends we have observed in 2023 data:

  • The number of victims encountered by Orange Cyberdefense in South-east Asia has increased 36% YoY.
  • Distributions of industries and threat actors have mirrored global patterns. We anticipate that the problem will accelerate in regions like Singapore, where English is the primary business language.
  • In our data, Australia had by far the most victims in the region, with a growth of 62% YoY.
  • China appears to be somewhat immune to the specific “double extortion” form of cyber extortion threats. Unlike in many other nations, the victim numbers have remained largely constant and low since 2022. We believe that the reasons for this have to do with language, culture, and politics rather than a more robust technical security posture. Other cybercrimes may be more common in China but would be harder to observe and may not be publicly reported.