LETTERS: A recent report on the cyber threat posed by an emerging hacker group known as Dark Pink has laid bare the enormity and scope of digital threats that can harm the fundamentals of our security and interests.
Dark Pink is targeting confidential government and military data, using custom malware to infiltrate high-profile targets in Southeast Asia and Europe.
The report states that the group uses advanced custom tools, which are rarely seen in both tactic and technique, to compromise the defences of military branches in several countries in the region.
Dark Pink is just one of many hacker groups and activities that have made us and the region a primary target.
There is also the APT40, which has targeted maritime entities with operations in the region or those involved with territorial disputes, according to a report by Insikt Group, the threat research arm of Recorded Future, one of the world's largest intelligence and cybersecurity companies.
Malaysia reportedly is among the targets, as well as Indonesia and Vietnam, for intrusion campaigns in support of key strategic aims.
Other targets include unique servers in the region that have become part of cyber espionage programmes, some of which are state-sponsored.
Different groups of state-sponsored hackers have compromised telecom operators in Turkiye, Kazakhstan, India, Thailand, as well as Malaysia, as pointed out by the sources in the report.
Other cybersecurity firms, such as FireEye and Cybereason, have also raised the alarm on the surgical and targeted tactics and approaches used in cyber espionage.
This has led to a stark awakening on the non-conventional threats in the digital world.
This digital and cyber threat spectrum is just one part of the much larger threat equation we and other nations are facing. It will remain so and may even intensify should we remain indifferent.
The combination of direct and indirect intrusions and threats pose a danger to our interests and the sustainability of our communities, businesses and the nation.
We must be mindful of the modus operandi, infiltration strategies and target approaches that may compromise our defences and sensitive data and assets.
This includes disinformation and misinformation campaigns and sustained influence-seeking activities in soliciting for favours or stealing information. To address this, we need to work stronger together on all fronts.
It is time our defence and security organisations become more inclusive and engaging to better utilise our resources against the constantly changing attackers.
COLLINS CHONG YEW KEAT
Kuala Lumpur
The views expressed in this article are the author's own and do not necessarily reflect those of the New Straits Times