Site icon Youth Ki Awaaz

Number Of Russian Accounts Hacked Has Spiked By 136% Since The War Began

putin

According to a Surfshark study, the number of Russian accounts invaded has increased by 136% since the beginning of Russia’s invasion of Ukraine in March, compared to February. Simultaneously, the number of leaks in Ukraine fell by 67%, compared to the pre-war quarter.

These figures are most likely influenced by the fact that the hacker group Anonymous announced at the start of the conflict that it would target Russia. The US came in second, followed by Poland, France, and India at the fifth position.

In the first quarter of 2022, the five countries with the most data leaks accounted for half of all leaks. Russians account for nearly one-fifth of all victims globally.

According to Aleksandr Valentijj, Surfshark’s chief information security officer: “Although data breaches have decreased in recent months, they are still one of the most common types of cybercrime.”

Leaked e-mails, passwords, phone numbers, and other sensitive data pools are commonly sold on dark networks for use in phishing attacks, ransomware, and even identity theft.

As evidenced by our most recent data, some countries have been more vulnerable to this situation than others in recent months.

Why Data Breaches Are A Serious Problem Nowadays

Cloud computing has provided enterprises with a new experience, with improved business efficiency, agile response, and great flexibility.

However, there is a major challenge lurking behind these benefits: cloud security. Safety is an important production factor at all times.

If an enterprise has a safety problem, all previous efforts will be null and void, seriously impeding the enterprise’s growth. Data leakage is currently the most serious and dangerous cloud security issue.

Data leakage will not only result in the loss of information for enterprises and users, but will also cause irreversible damage to enterprises’ reputations and have a serious impact on their development. Too many businesses rely on the cloud without proper architecture and strategy.

Users will be vulnerable to network attacks if proper planning is not implemented, which may result in financial losses, reputation damage, and legal and compliance issues.

Featured image is for representational purposes only.
Exit mobile version