According to research by Kaspersky Lab, Tajikistan ranks first among CIS countries in terms of cyber threats.

“2024 Cyber Threat Landscape Report: Russia and CIS" notes that since the beginning of 2024, nearly 60.69% of Tajik users have encountered cyber threats, slightly higher than other CIS countries. Belarus ranks second with 59.79%, followed by Turkmenistan with 59.55%, and Uzbekistan with 58.74%. Kyrgyzstan (57.21%), Kazakhstan (54.62%), Russia (51.86%), Azerbaijan (49.73%), and Armenia (44.21%) follow.

The term "Cyber Threat Landscape" describes the broad picture that represents potential cybersecurity risks and identified threats faced by individuals, organizations, and societies in the internet world. It covers the numerous risks, weaknesses, and actors that are present in the cybersecurity field.

 

How realistic are these findings?

Muhammadi Ibodulloyev, Director of the Public Foundation Civil Initiative on Internet Policy (CIIP), believes that Kaspersky Lab's data partially reflects reality but emphasizes that drawing conclusions from a single study is incorrect.  He notes that other antivirus solutions like Dr. Web and Microsoft’s Windows Defender also play significant roles in Tajikistan.  The high usage of Kaspersky products in the country could skew the results.  Ibodulloyev suggests examining reports from multiple companies to get a comprehensive view of the situation.

The reported differences among the countries in this study are only 1-2%, indicating that all are at a similar level of cyber threat exposure.

 

Which sectors are under threat?

According to the report, the most frequently attacked sectors are: finance -- 28%; construction – 24%; manufacturing -- 14%; and transport – 9%.

Ibodulloyev highlights that the financial sector is always a prime target for cyber threats because it involves direct monetary transactions.  Experts agree that financial motivations drive many cyberattacks.

Young IT expert Rizo Giyoyev explains that cybercriminals often target bank clients rather than banks themselves, as clients usually lack robust security measures.  Using public information obtained through social engineering, cybercriminals exploit these vulnerabilities.

 

Hackers seeking vulnerabilities

IT technology expert Asomiddin Atoyev points out that cybercriminals pose threats to all internet users, irrespective of their location, except for those groups carrying out political orders.  He believes that cybercriminals hunt for users with numerous vulnerabilities, either unknown or ignored by the users. Atoyev mentions that users with a strong belief that “I have nothing to hide” and who neglect basic digital hygiene are particularly vulnerable.

 

Unlicensed software and infected flash drives

Talat Numonov, Director of the ICT Center, states that cybercriminals intensify their attacks upon discovering vulnerabilities or weak points in the equipment and information systems of a state or company.  One of the primary vulnerabilities among Tajik users is the widespread use of unlicensed software.

Ibodulloyev adds that chaotic use of personal and office devices exacerbates the issue.

 

Digital illiteracy

Rizo Giyoyev emphasizes the lack of technological knowledge among Tajik users. Such individuals are easily hacked, deceived, and their data and money stolen.  This digital illiteracy makes Tajik residents frequent targets for cyberattacks.

Atoyev identifies several examples of poor digital practices: failing to update operating systems and software; reusing simple passwords; using email addresses of previous owners on mobile devices; not using licensed antivirus software or ignoring updates; clicking on suspicious links; and accepting every friend request on social media without scrutiny.

 

How Protected Are We?

Experts note that while financial institutions and telecommunications companies are generally protected, other infrastructure sectors receive less attention.

According to them, national legislation lacks terms like "critical infrastructure" and "critical information infrastructure." They emphasize the importance of introducing these concepts and implementing systematic measures to ensure the security of such infrastructures, especially those owned by government institutions.

Besides, many Tajik websites reportedly lack security certificates.  All websites, especially government sites, should have certificates that ensure reliability and user security.  However, some Tajik sites do not meet even this minimum requirement, according to the experts.