The NCSC’s Cyber Security Insights report for Q4 2024 highlights a significant rise in financial losses due to cybercrime in New Zealand, amounting to .8 million, a 24% increase from the previous quarter. The report reveals a concerning trend in high-loss incidents, often starting from impersonation scams via phone calls. There is a decline in reported incident numbers, particularly phishing, yet the NCSC stresses the ongoing threat of underreporting. Affected: New Zealand financial sector, cybersecurity landscape, individuals and businesses.
Keypoints :
- Financial losses from cybercrime in Q4 2024 reached .8 million, up from .5 million in Q3.
- There was a notable increase in high-loss incidents, with 17 cases exceeding 0,000.
- Most incidents stemmed from cyber attacks on computers/accounts and impersonation scams.
- Reported incidents through the NCSC online tool decreased by 34%.
- Cybercrime is believed to be significantly underreported in New Zealand.
- 506 cases of scams and fraud were reported, alongside 382 phishing incidents.
- DDoS attack incidents increased by 400% compared to the previous quarter.
- The NCSC triaged a total of 1,358 incidents, 100 categorized as of national importance.
- Cybercrime has cost New Zealand million over the past eight quarters.
- The NCSC offers services like the Phishing Disruption Service and Malware Free Networks program to combat cybercrime.
MITRE Techniques :
- Pre-Texting (T1201): Cyber incidents often began with phone calls impersonating well-known organizations.
- Credential Dumping (T1003): Incidents included the theft of credentials related to reconnaissance activities.
- Phishing (T1566): A significant number of reported incidents involved phishing attempts leading to financial losses.
- Malware Delivery (T1203): Use of malware was reported within unauthorized access incidents.
- Denial-of-Service (T1499): Distributed denial-of-service attacks saw a 400% increase in incidents reported.
Indicator of Compromise :
- [Domain] malicious.com
- [Domain] example.com
- [IP Address] 192.168.1.1
- [Hash MD5] d41d8cd98f00b204e9800998ecf8427e
- [Email Address] attacker@example.com
Full Story: https://cyble.com/blog/ncsc-reports-6-8m-losses-in-q4-2024/