Digital Threat Report 2024

Syllabus: GS3/Cybersecurity

Context

  • Computer Emergency Response Team (CERT-In) and SISA launched the first Digital Threat Report 2024 to support cybersecurity in the Banking, Financial Services and Insurance (BFSI) sector.

About

  • The report offers insights into current and emerging cyber threats, vulnerabilities, and adversarial tactics affecting BFSI.
  • The findings offer a holistic understanding of the current cybersecurity landscape and guide organizations in preparing for future threats.
About SISA
SISA is a global forensics-driven cybersecurity solutions company for the digital payments industry, trusted by leading organizations for securing their businesses. 
– SISA applies the power of forensic intelligence and advanced technology to offer true security to over 2,000 customers across over 40 countries.

Major Highlights

  • Sophistication of Cyberattacks: Over the past year, cyberattacks have grown more advanced, leveraging new techniques and persistent methods.
  • Rise in Social Engineering: Business Email Compromise (BEC) and advanced phishing campaigns are more precise, often fueled by data from the dark web.
  • Bypassing Traditional Defenses: Cyberattacks now effectively neutralize multifactor authentication using stolen credentials and session cookies.
  • Supply Chain Breaches: Trust in third-party vendors and open-source repositories has led to an increase in supply chain breaches, exposing vulnerabilities at scale.
  • AI-Driven Threats: Artificial intelligence is transforming cybersecurity, both driving innovation and empowering attackers to conduct highly personalized, evasive, large-scale attacks.
  • Future Threats: AI-driven threats are expected to challenge existing defense mechanisms, requiring organizations to rethink their approach to threat detection and response.

Mitigation Strategies 

  • Multi-Factor Authentication (MFA): Enable MFA for VPNs, webmail, and accounts accessing critical systems. 
  • Regular Updates: Ensure all operating systems and applications are updated regularly. Use virtual patching to protect legacy systems and networks. 
  • Data Protection: Enforce data protection, backup, and recovery measures. Encrypt data at rest to safeguard against breaches and exfiltration. 
  • Network Segmentation: Implement network segmentation into security zones. Separate administrative networks from business processes using physical controls and VLANs. 
Mitigation Strategies

Conclusion

  • There is a need for unified technology, compliance, and threat intelligence to safeguard financial transactions.
  • The report provides actionable steps based on audits and incident analysis to close control gaps, strengthen defenses, and build adaptive strategies.
  • It advocates for a proactive, intelligence-driven cybersecurity strategy for financial institutions.
What is Cybercrime?
– Cybercrime refers to criminal activities that involve the use of computers, networks, and digital technologies. 
– Cybercriminals employ various techniques and tools to exploit vulnerabilities in networks, and they may target individuals, organizations, or even governments.
Common types of Cybercrime include
Hacking: Unauthorized access to computer systems or networks to steal, alter, or destroy data.
Phishing: Deceptive attempts to acquire sensitive information, such as usernames, passwords, and financial details, by posing as a trustworthy entity.
Malware: Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems. This includes viruses, worms, trojans, ransomware, and spyware.
Identity Theft: Stealing and using someone’s personal information, such as social security numbers or credit card details, for fraudulent purposes.
Cyber Espionage: Covert activities aimed at gaining unauthorized access to sensitive information for political, economic, or military purposes.
Cyberbullying: Using digital platforms to harass, threaten, or intimidate individuals.
Online Fraud: Engaging in fraudulent activities, such as online scams and financial fraud, to deceive and exploit victims for monetary gain.
Cyber Security Initiatives
Cyber Fraud Mitigation Centre (CFMC): Aims to enable immediate action against online financial crimes.
1. Acts as a centralized response system for digital financial frauds. Promotes “Cooperative Federalism” in cybercrime law enforcement.
‘Cyber Commandos’ Program:  Establishment of a special wing of trained personnel in States and Union Territories
Central Police Organizations (CPOs): Enhances technical capacity of police and security forces in cyber investigations and digital forensics.
Samanvay Platform: A web-based module designed to serve as a one-stop portal for all cybercrime data. Facilitate data repository, analytics, mapping, sharing, and investigation.
Cyber Suspect Registry: Created using inputs from the National Cybercrime Reporting Portal (NCRP). Strengthens fraud risk management in the financial sector.

Source: PIB

 

Other News of the Day

Syllabus: GS2/ International Relations Context Prime Minister Modi, during his visit to Sri Lanka, held a significant meeting with Sri Lankan President Anura Dissanayake in Colombo. Key Outcomes of the Meeting PM Modi was conferred ‘Mithra Vibhushana’ the country’s highest civilian honour medal by the Government of Sri Lanka. Energy Cooperation: Both the nations inked...
Read More

Syllabus: GS2-Governance /GS3-Economy  In News The Ministry of Home Affairs (MHA) announced that foreign funds obtained through the prior permission route under the Foreign Contribution (Regulation) Act, 2010, will now be valid for four years. Foreign Contribution (Regulation) Act (FCRA) The FCRA, first enacted in 1976 and amended in 2010 and 2020, requires NGOs to...
Read More

Syllabus: GS3/ Economy In News On 8 April 2025, India marked 10 years of the Pradhan Mantri MUDRA Yojana (PMMY). About the Scheme Launched: April 2015 Objective: To provide collateral-free institutional credit to non-corporate, non-farm micro and small enterprises. Tagline: Funding the Unfunded Implementation: Through MUDRA (Micro Units Development and Refinance Agency). Target: Small businesses...
Read More

Syllabus: GS2/Role of International Organizations; GS3/ Environment Context Recently, the United Nations Human Rights Council (UNHRC) has adopted a resolution recognizing the critical connection between plastic pollution, ocean protection, and the human right to a clean, healthy, and sustainable environment. Key Highlights of the Resolution   Interconnected Crises: Plastic pollution, climate change, and biodiversity loss collectively...
Read More

Syllabus: GS3/ Science and Technology, Space Context Recent research suggests that solar models have long underestimated iron's opacity and its impact on the Sun’s temperature profile. Why is Opacity? Opacity refers to a material's ability to absorb light; the higher the opacity, the more light it absorbs. In the context of stellar interiors, opacity determines...
Read More

Dokra Art Syllabus: GS1/ Art & Culture In News PM Modi gifted a Dokra Brass Peacock Boat with a Tribal Rider to the Thai Prime Minister. About Dokra Art The art form is over 4,000 years old, dating back to the Indus Valley Civilization (e.g., the famous Dancing Girl sculpture from Mohenjo-daro). The name "Dhokra"...
Read More