Home » Emerging technologies » Cyber Security » Cyberattacks Trigger Data Breaches in Middle East
News Desk -

Share

Positive Technologies has announced the findings of a recent study on cyberthreats targeting the Middle East. The research highlights how digital transformation, combined with the growing underground cybercrime market, is increasing the region’s exposure to data breaches and business disruptions.

According to the study, one in three successful cyberattacks was linked to advanced persistent threat (APT) groups. These groups often targeted government systems and critical infrastructure. Positive Technologies reported that the rapid deployment of IT systems, while boosting efficiency, also expands the attack surface for cybercriminals.

The company found that attackers heavily relied on social engineering in 61% of cases and used malware in 51% of incidents. Often, both methods were combined. Remote access trojans (RATs) were used in 27% of malware-based attacks, suggesting long-term access was a key goal.

Positive Technologies stated that 80% of all cyberattacks on organizations in the region led to data breaches. Stolen data included:

  • Credentials and trade secrets (29% each)
  • Personal data (20%)

This information was frequently used for blackmail or sold on the dark web.

The second most common impact of these attacks was operational disruption, occurring in 38% of cases. Sectors such as healthcare, transport, and government services were particularly affected, where even short downtimes had serious consequences.

APT groups were identified as the most dangerous actors due to their financial resources and technical capabilities. In 2024, they were responsible for 32% of all cyber incidents. Their operations often included cyberespionage or cyberwarfare, going beyond data theft to damage public trust and assert digital dominance.

The analysis revealed frequent mentions of Middle Eastern targets on dark web forums. Government entities made up 34% of mentions, followed by the industrial sector at 20%. Hacktivists were especially active and often shared stolen data freely, worsening the threat landscape.

Countries most frequently mentioned in dark web activity included the UAE, Saudi Arabia, Israel, and Qatar. These nations lead in digital growth, but their rapid transformation has introduced vulnerabilities that cybercriminals exploit quickly.

Alexey Lukash, analyst at Positive Technologies, warned that cyberthreats in the region are expected to grow in both scale and sophistication. As more systems go digital, the number of potential attack points rises. He advised that governments prioritize the protection of infrastructure, financial systems, and public services to prevent data breaches and threats to national security.

To support organizations in reducing risks, Positive Technologies recommends:

  • Deploying vulnerability management systems to identify and fix flaws
  • Using network traffic analysis to detect attacks
  • Securing applications with solutions like PT Application Firewall and PT Application Inspector

The company emphasized that a results-driven, flexible cybersecurity approach is essential. This should prevent disruptions and deliver measurable outcomes across organizations, industries, and even national digital ecosystems.