Saudi National Cyber Security Detects Unconventional Malware

An illustration picture shows a projection of binary code on a man holding a laptop computer, in an office in Warsaw June 24, 2013. (Reuters)
An illustration picture shows a projection of binary code on a man holding a laptop computer, in an office in Warsaw June 24, 2013. (Reuters)
TT

Saudi National Cyber Security Detects Unconventional Malware

An illustration picture shows a projection of binary code on a man holding a laptop computer, in an office in Warsaw June 24, 2013. (Reuters)
An illustration picture shows a projection of binary code on a man holding a laptop computer, in an office in Warsaw June 24, 2013. (Reuters)

Saudi Arabia’s National Cyber Security Center (NCSC) provided government agencies with information and methods to prevent a new malware that cyber-attackers are using to hack into electronic devices.

The center recently discovered the use of unconventional methods by hackers attempting to bypass security verification of E-Systems, including the so-called DNS-BOT, Executive Director of Strategic Development Dr. Abbad al-Abbad told Asharq Al-Awsat.

He also pointed out that the center’s recommendations contribute to the prevention against such breaches.

Al-Abbad reviewed the level of responsiveness of government agencies as positive and in steady improvement.

“The center does not work alone, but works hand in hand and cooperates with all vital bodies to address the electronic threats facing Saudi Arabia,” he said.

“It seeks to raise the level of maturity and develop and apply best practices and methods of prevention of these attacks, hoping at the same time to increase awareness among all security levels,” he added.

He pointed out that e-security bodies in Saudi Arabia are tethered to governmental and vital authorities to achieve the key objective of protecting the Kingdom's cyberspace.

The center continues to promote prevention methods that can neutralize various types of malware and reboot attacked systems.

More so, the center launched on Tuesday a social media campaign which included warnings of what was described as the unconventional «DNS - Bot» malware.

Evidence shows that DNS - Bot attackers are generated by bots running in home gateways. Attackers scan the Internet for home gateways with weak passwords and login, and use load malware that enables DDoS attacks. There are direct links between strings discovered in the malware and attack activity.

Additional research showed other kinds of devices, like cameras, can also be compromised.

According to the Center, prevention methods include keeping records of DNS protocol and reviewing unusual communications.

The Center explained that the attack and its effects lie in controlling the victim's device, stealing data, putting malicious software in the victim's network, and possibly a sabotage attack on the network.



China Vows to Protect its Rights against US Chip Probe

A Chinese flag is displayed next to a "Made in China" sign seen on a printed circuit board with semiconductor chips, in this illustration picture taken February 17, 2023. REUTERS/Florence Lo/Illustration/File Photo
A Chinese flag is displayed next to a "Made in China" sign seen on a printed circuit board with semiconductor chips, in this illustration picture taken February 17, 2023. REUTERS/Florence Lo/Illustration/File Photo
TT

China Vows to Protect its Rights against US Chip Probe

A Chinese flag is displayed next to a "Made in China" sign seen on a printed circuit board with semiconductor chips, in this illustration picture taken February 17, 2023. REUTERS/Florence Lo/Illustration/File Photo
A Chinese flag is displayed next to a "Made in China" sign seen on a printed circuit board with semiconductor chips, in this illustration picture taken February 17, 2023. REUTERS/Florence Lo/Illustration/File Photo

China's commerce ministry vowed on Monday to take all necessary measures to safeguard its rights and interests in response to the United States' investigation into the Chinese semiconductor industry.

The investigation will disrupt global chip supply chains and harm the interests of US firms and consumers, the ministry statement said.

On Monday, the Biden administration announced a last-minute trade investigation into Chinese-made "legacy" semiconductors that could heap more US tariffs on chips from China that power everyday goods from autos to washing machines to telecoms gear, Reuters reported.

The "Section 301" probe, launched just four weeks before President-elect Donald Trump takes office on Jan. 20, will be handed over to his administration in January for completion, Biden administration officials said.

The effort could offer Trump a ready avenue to begin imposing some of the hefty, 60% tariffs that he has threatened on Chinese imports.

Departing President Joe Biden has already imposed a 50% US tariff on Chinese semiconductors that starts on Jan. 1. His administration has tightened export curbs on advanced AI and memory chips and chipmaking equipment to China and also recently increased tariffs to 50% on Chinese solar wafers and polysilicon.