Experts: This is the biggest cybersecurity threat of 2022

Neu und brandgefährlich: Ransomware, die sich als Enstchlüsselungs-Tool tarnt

© APA – Austria Press Agency

B2B

A trend has emerged among cybercriminals that is growing into a massive threat.

Hospitals, fuel supply systems, dairies, large retail chains: In 2021, there were numerous operators of important systems, critical infrastructure and service providers affected by cyber attacks. Blackmailers paralyzed the company networks and encrypted files in the system in such a way that nobody could access them and they could extort a ransom. The software used in such attacks is called Ransomware and they also us 2022 continue to employ.

“The business model behind it is evolving,” says Wolfgang Lauer, Austrian Country Manager of the security service provider Sophos in conversation with futurezone. “Threat scenarios are becoming more and more professional and groups often come together. Ransomware attacks have become an industry of their own, software development is done in a negative sense,” says Lauer.

Wolfgang Lauer has been Country Manager of Sophos for Austria for four years

© Sophos

Attacks as a Service

Cyber ​​criminals offer various elements for an attack “as-a-Service

” as a service . They provide precise instructions, tools and techniques that other groups can use to carry out their ransomware attacks, according to the “Threat Report” by Sophos. As early as 2021, security researchers were able to observe how criminals rented malicious codes and infrastructure in order to find and attack potential victims.

“The business model used for the cybercriminals behind ransomware is unfortunately still closed
lucrative than it could disappear any time soon. The Threat still too often turns into a real case of damage, because there is still too little awareness of how to feel in behaves securely in the digital space”, also confirms

Wolfgang Rosenkranz from the CERT.at, Austria’s “internet fire brigade”, which regularly warns companies of current threats.

“Managing directors and board members often only have a faint awareness of the threats, and often the approach is not taken pursued, which would be necessary here in order not to be attacked,” warns Lauer. “Many people in charge are still not aware of what it means when their company stands still for weeks,” says Lauer from Sophos.

Prominent affected cases from 2021

But this is exactly what the fuel pipeline operator Colonial Pipeline happened in the week and a half the Main lines stopped and there were bottlenecks in the fuel supply in some US states. Also at Salzburger Großmolkerei Salzburgmilch and the retail chain Media Markt there were production stops and limited service.

At Salzburgmilch all passwords had been changed by the cybercriminals, so that it to a total failure of the IT systems came. As a result, orders were no longer possible. At the Media Markt the blackmailers initially ransom $240 million

until the sum reaches 50 million had been reduced.

Managed Services for Enterprise

” It is important for companies not only to react to such attacks, but to actively protect themselves from them,” explains Lauer. It is therefore important that infrastructure is monitored prophylactically around the clock to identify intruders. “Cyber ​​criminals often spend weeks or months in the affected IT systems to scout out everything. If they strike on day X, usually on a Friday or Saturday, the perpetrators know exactly what they are doing and this is what causes the major damage,” says Lauer.

Sophos has been offering such protection for two years as “Managed Services” service that focuses precisely on protecting IT systems. “This trend will increase massively in 2022,” believes Lauer. So far we have around 6000 customers in two years won, according to Sophos. It is often difficult for companies to find suitable employees, and with IT security in particular it is important that experts regularly monitor the systems and react immediately if something suspicious is seen in the company network.

Confirmed that there is an acute shortage of IT specialists in the field of security also rosary from CERT.at. “The more complex IT becomes, the more difficult it becomes for those IT professionals who can detect and defend against attacks. We have already seen in 2021 that there are no longer enough experts to to be able to react quickly to attacks and 2022 is not yet an improvement of this situation in sight”, says Rosenkranz.

Early detection of the intruders prevents the worst

“But you have to watch what’s happening in real time in order to quickly quarantine certain services and files to be able to pronounce when you have spotted an intruder”, says Sebastian Kaiser, IT expert at Sophos. Ransomware attacks have proven to be extremely lucrative as many companies are unprepared and therefore pay the ransom.

“Cyber ​​criminals also jump on any vulnerability in the system in order to extort money. However, an intruder can usually be detected at an early stage, drastically reduced and even stopped with simple means,” says Kaiser. “We have the tools for this, but we also have to use them,” says the IT expert. Companies, on the other hand, would often postpone the budget they should plan for IT security until “next year”.

Sebastian Kaiser is an IT expert at Sophos

© Sophos

Instead of paying ransom, call in experts

Anyone who does this and is hit by a ransomware attack usually pays dearly: Because in addition to ransom demands, you often have to IT emergency teams move out to straighten out the problems. Sophos also offers this as a service. “Here, we often find that there have been abnormalities in the company network 30 days beforehand, but these have been ignored,” says Kaiser.

Instead of immediately asking for a ransom – From the point of view of the Sophos experts, it is important to seek the way to security specialists in order to analyze the attack and to look for solutions on how to get out of it. That is the “safer way”. “Only after an inventory analysis should you decide how to proceed, advises Kaiser. “Smaller companies in particular are quick to make payments. But that doesn’t protect against repetition and soon the next blackmailers will be able to exploit the loopholes,” warns Lauer.

Because in special Internet forums where cyber criminals exchange ideas, all vulnerabilities offered for sale to infiltrate corporate networks. “If you can gain access, it will be exploited,” says Kaiser. Company bosses are therefore well advised to take the issue of IT security more seriously in 2022 than before.

More on the subject

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
‘Beneath the Sea’ is Now Available As An eBook thumbnail

‘Beneath the Sea’ is Now Available As An eBook

The popular book “Beneath the Sea” is now available as an ebook. The book is the work of diving pioneer Bill High who, aside from his role as founder of PSI-PCI has achieved many feats in a long and illustrious diving carer, including: Authoring the original NOAA Dive Manual and playing a critical role in
Read More
Fish fertilize corals and seagrasses, but not the way you think thumbnail

Fish fertilize corals and seagrasses, but not the way you think

Credit: Sean Mattson Fish are like underwater gardeners, fertilizing the coral reefs, kelp forests and seagrasses where they reside. Their fertilizer of choice—their own pee. But, fish communities are facing many changes. Warming oceans mean tropical fish can venture into areas they couldn't before when the waters were cooler. And then there are the human…
Read More
Is it possible to reach absolute zero? thumbnail

Is it possible to reach absolute zero?

If we reached absolute zero, would we even know it? (Image credit: Erik Von Weber via Getty Images) Absolute zero is the lowest theoretical temperature, which scientists have defined as minus 459.67 degrees Fahrenheit (minus 273.15 degrees Celsius). That's even colder than outer space. So far, nothing we know of has reached absolute zero. But
Read More
Alaska-Australia flight could place bird in record books thumbnail

Alaska-Australia flight could place bird in record books

ROD McGUIRK, Associated PressOct. 28, 2022Updated: Oct. 28, 2022 1:19 p.m.This is a carousel. Use Next and Previous buttons to navigate 1of3Bar-tailed godwits stand on the beach at Marion Bay in Australia's Tasmania state on Feb. 17, 2018. A young bar-tailed godwit appears to have set a non-stop distance record for migratory birds by flying at least
Read More
Constructive principles for gene editing oversight thumbnail

Constructive principles for gene editing oversight

To the Editor — A Correspondence in your September issue1 highlights key principles for responsible oversight of gene editing in agricultural and environmental applications. As longtime stakeholders in biotech, we welcome the constructive and pragmatic approach outlined by Doria Gordon et al. as a new direction for non-governmental organizations working with regulators to promote safe…
Read More
Index Of News
Consider making some contribution to keep us going. We are donation based team who works to bring the best content to the readers. Every donation matters.
Donate Now

Subscription Form

Liking our Index Of News so far? Would you like to subscribe to receive news updates daily?

Total
0
Share