On June 2, the ferry service in Massachusetts, the United States, was forced to be interrupted due to a ransomware attack. On May 30, JBS, the world's largest meat processor, was attacked by hackers and demanded a ransom. The servers of its North American and Australian branches were affected and operations were interrupted. On May 7, after the Colonial Pipeline, the largest fuel pipeline operator in the United States, was attacked by ransomware and the pipeline was shut down, the United States declared a state of emergency...
Ransomware attacks have been emerging one after another recently, and are becoming more and more severe. Charlie Gero, Vice President and Chief Technology Officer of Akamai's Security Technology Team, analyzed the recent major attacks and pointed out the means and methods of defense for enterprises.
Charlie Gero, Vice President and Chief Technology Officer, Security Technology Group, Akamai
“We don’t yet know the details of the current ransomware attack on the Massachusetts Steamship Authority, but one thing is certain: this particular type of malware attack is increasing in frequency. The Colonial Pipeline was already down for days, a JBS meatpacking facility was forced to shut down, and now the Steamship Authority has been shut down as well. All three cases used ransomware to disrupt the operations of these companies, and at least the first two were carried out by actors operating in or associated with Russia. Thankfully, the new attack by Nobelium (the hackers responsible for the massive SolarWinds data breach that is still affecting the world) has been detected and largely repelled.
“This highlights a very important point: more and more critical infrastructure is accessible online. The Internet is more than just a technology that enables social media and memes; it has become the core infrastructure for physical services we rely on every day, such as gas energy, food transportation, transportation, and banking. As industries use the Internet to streamline operations and deployment, they must balance the huge benefits of connected infrastructure with the high risks of being on a global platform where attackers can discover, infect, and hold hostage their assets from halfway around the world.
"Akamai expects this trend to not only continue, but to increase in frequency. Therefore, enterprises must deploy state-of-the-art security services to stay ahead of their attackers in this ever-expanding arms race. At a minimum, enterprises should install antivirus software on each of their critical machines. Systems that do not need to connect to the Internet should be completely 'separated' from those that do. In accordance with the principles of zero trust, strict access controls should be implemented on access to each application and services such as cloud access security brokers and secure web gateways should be introduced to perform further malware inspection on data flows to limit the spread of sensitive information within customer networks.
“The fact that so much critical infrastructure has been shut down in such a short period of time over the past few weeks speaks volumes about the scale of the problem. It tells us that many organizations’ security posture is not where it needs to be right now. As attackers continue to advance in speed and sophistication, all organizations should take this as a lesson, review their internal security practices and measures, and do everything they can to avoid becoming the next headline.”
Previous article:Ransomware is one of the biggest threats to cybersecurity
Next article:TI Chip Technology Empowers China's New Infrastructure: 5G Base Station Construction
Recommended ReadingLatest update time:2024-11-15 11:12
- Popular Resources
- Popular amplifiers
- Keysight Technologies FieldFox handheld analyzer with VDI spread spectrum module to achieve millimeter wave analysis function
- Qualcomm launches its first RISC-V architecture programmable connectivity module QCC74xM, supporting Wi-Fi 6 and other protocols
- Microchip Launches Broadest Portfolio of IGBT 7 Power Devices Designed for Sustainable Development, E-Mobility and Data Center Applications
- Infineon Technologies Launches New High-Performance Microcontroller AURIX™ TC4Dx
- Rambus Announces Industry’s First HBM4 Controller IP to Accelerate Next-Generation AI Workloads
- NXP FRDM platform promotes wireless connectivity
- WPG Group launches Wi-Fi 7 home gateway solution based on Qualcomm products
- Exclusive interview with Silicon Labs: In-depth discussion on the future development trend of Bluetooth 6.0
- Works With Online Developer Conference is about to start, experience the essence of global activities online
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Apple faces class action lawsuit from 40 million UK iCloud users, faces $27.6 billion in claims
- Apple faces class action lawsuit from 40 million UK iCloud users, faces $27.6 billion in claims
- The US asked TSMC to restrict the export of high-end chips, and the Ministry of Commerce responded
- The US asked TSMC to restrict the export of high-end chips, and the Ministry of Commerce responded
- ASML predicts that its revenue in 2030 will exceed 457 billion yuan! Gross profit margin 56-60%
- Detailed explanation of intelligent car body perception system
- How to solve the problem that the servo drive is not enabled
- Why does the servo drive not power on?
- What point should I connect to when the servo is turned on?
- How to turn on the internal enable of Panasonic servo drive?
- E22-400TBL-01 LoRa module test version + 02 initial test
- Why? The 32768 in MSP430F2001 does not oscillate
- Construction of CCS v5 software development environment for TMS320C6000
- About the IP address routing of the WiFi module
- DSP2812 code is blocked by compiler problem
- DSP TMS320F28335 interrupt vector table
- (3) UART DMA plus IDLE interrupt indefinite length byte reception
- This positioning hole and via are the same as repairing a building.
- SVPWM control of sensored BLDC cannot start when fixed sector 5
- TMS570 Learning 1- Creating Engineering Lighting