Cyber security news for all

More

    Targeted cyber attacks on the energy industry

    The energy industry is particularly worthy of protection and is subject to strict legal requirements. A failure or impairment of supply services would have an enormous impact on the economy, the state and society.

    Cybercriminals are also aware of this. In addition to threat vectors such as hacked web applications, unpatched and outdated systems as well as unsecured servers, companies should particularly keep an eye on e-mail as a gateway for cyber attacks.

    Email Is The Main Gateway

    Hackers attempted to penetrate the systems of companies in the energy industry primarily using malicious links placed in e-mail messages. Malicious attachments and phishing emails are also among the preferred types of attack by cybercriminals. It becomes clear: Humans are the most popular IT vulnerability among hackers.

    With little technical effort and social engineering tactics, the cybercriminals entice employees to click on infected links that download malware or intercept login data that open gates for hackers to carry out further attacks. Especially with the high legal IT security standards to which critical infrastructures are subject, people are often the one security gap that can destroy supposedly comprehensive protection with one click.

    Behind Such Attacks Are Often Larger And Professionally Organized Hacking Teams

    On behalf of governments or secret services, they want to gain access to secret information or put pressure on the affected state in the event of possible conflicts. To do this, it is often sufficient to shut down individual areas in the company, by encrypting important files. However, attacks by smaller cybercriminal gangs are also conceivable. Basically, it stands to reason that the more critical the attacked infrastructure, the higher the likelihood that those affected will pay for a decryption key in the event of a ransomware attack.

    Interested in learning more about how your organisation can guard itself against cyber security threats? Click here to download the Report on Cyber Threats to Operational Technologies in the Energy Sector.

    Recent Articles

    Millions of RDP attacks on home offices

    Since the corona related move to the home office, the number of daily hacker attacks on remote desktop connections has increased more than tenfold....

    KuCion crypto confirms 150 million dollar security breach

    Cyber criminals were able to steal from the KuCion crypto and stole coins worth millions. On the evening of last Friday, KuCion crypto noticed...

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox