Cyber security news for all

More

    Cyber criminals focus on the energy industry

    The security experts were able to use an analysis of around 1,000 domains with the largest email volume to identify the top industries that were particularly hard hit by email cyber criminals.

    The Energy Industry Is The Number One Cyberattack Target

    Even ahead of the logistics and automotive industries. As part of a country’s critical infrastructure, the energy sector is particularly worthy of protection and is subject to strict legal requirements.

    A failure or impairment of supply services would have an enormous impact on the economy, the state and society. Cyber criminals are also aware of this. In addition to threat vectors such as hacked web applications, unpatched and outdated systems as well as unsecured servers, companies should particularly keep an eye on e-mail as a gateway for cyber attacks.

    Larger And Professionally Organized Hacking Teams

    Hackers tried to penetrate the systems of companies in the energy sector primarily using malicious links placed in e-mail messages. Malicious attachments and phishing emails are also among the preferred types of attack by cyber criminals. Humans are the most popular IT vulnerability among hackers.

    With little technical effort and social engineering tactics, the cyber criminals induce employees to click on infected links that download malware or intercept login data that open the gates to hackers for further attacks. Especially with the high legal IT security standards to which critical infrastructures are subject, people are often the one security gap that can destroy supposedly comprehensive protection with a click.

    Behind such attacks are often larger and professionally organized hacking teams. On behalf of governments or secret services, they want to gain access to secret information, or put pressure on the affected state in the event of possible conflicts. To do this, it is often sufficient to shut down individual areas in the company by encrypting important files.

    However, attacks by smaller cyber criminals gangs are also conceivable. Basically, it stands to reason that the more critical the attacked infrastructure, the higher the likelihood that those affected will pay for a decryption key. In the event of a ransomware attack, the operational process can be continued as quickly as possible.

    Recent Articles

    Personnel were asked to removed 89 apps which includes Instagram, Facebook, and others by the Indian Army

    Personnel are told by the Indian Army to delete 89 apps from their phones from July 15. This is in a bid to avoid...

    The warning sent to employees about Tiktok app was a mistake says Amazon

    On Friday morning, Amazon sent out a memo to its employees, asking them to uninstall the popular social media app TikTok off their phone....

    Other Android phones sold in the US contains pre-installed malware

    There’s a discovery of Pre-installed malware on another phone by researchers from Malwarebytes; through the lifeline Assistance program for sale in the United States....

    About 15 billion stolen passwords and usernames sold on the dark web.

    A recent finding has shown that about 15 billion passwords and usernames are distributed on the dark web. This compromise will bring about credential...

    Hundreds of multinational companies aimed by Russian BEC Gang

    According to the security firm Agari, there has been a discovery of a newly uncovered Russia-based business email compromise gang; BEC gang that scams...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox