Hackers Step Out Of The Shadows With Bigger, Bolder Attacks

Stealth and secrecy use to be the hallmarks of cyber espionage and cyber-warfare, with spies and hackers sneaking in and out of target networks without leaving a trace or evidence that could be linked back to them.

But increasingly, cyber-attacks are now carried out in fully public view, and many attackers don't appear to worry so much about keeping under the radar. Some even seem to go out of their way to make sure they are spotted.

One example of the way cyber-attacks have gone public: the WannaCry ransomware caused chaos and made headlines around the world, with many businesses locked out of their PCs by hackers who demanded a bitcoin ransom in exchange for restoring access to data. 

But even if victims opted to give into the attack and pay the ransom, which some did, there was never any means of the attackers fulfilling their end of the deal.

WannaCry was attributed to North Korea, with Pyongyang having taken advantage of EternalBlue, a leaked NSA hacking tool, to help power the spread of the attack. 
It's still not clear whether it was a bungled attempt to make money or simply a show of force by the North Korean regime.

Just weeks later, organisations around the world were hit by what first appeared to be another ransomware attack dubbed NotPetya. But in this case it soon became apparent that acquiring cryptocurrency was never the goal: there wasn't even a means to pay. NotPetya was a wiper, designed to destroy data on the machines it was targeting, not hold them to ransom.

The attack was seemingly designed to target Ukraine, but it spread across the world, causing billions of dollars in damage. In this instance, the US, UK and a number of other states eventually pointed to state-backed Russian hackers as the culprits.

ZDNet:

You Might Also Read:

Russian Hackers Have New Weapons

« Indian Government To Provide Handbook On Cyber Safety To School Children
Insurance: Common Cyber Security Myths »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

Onsist

Onsist

Onsist brand protection services provide proactive defense against fraudulent use of your brand online.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

Ribbon Communications

Ribbon Communications

Ribbon Communications delivers global communications software and network solutions to service providers, enterprises, and critical infrastructure sectors.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Cyber Guru

Cyber Guru

Cyber Guru is an effective cybersecurity awareness training platform, enabling organisations to increase their resistance to cyber-attacks by changing employee behaviour.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.