Connect with us

Hi, what are you looking for?

Tech & Science

Caught out: U.S. Court in ransomware attack (Includes interview)

According to CBR, targeting ‘a successful’ (from the point of view of the hackers) ransomware attack directly a U.S. court is thought to be the first ransomware attack of its kind,in terms of documents and court data being exfiltrated and published. After stealing the Louisiana court documents, which reportedly related to witnesses, jurors, and defendant pleas, the hackers posted proof of the hack attack on its Dark Web page.

The agent for the attack was Conti, a relatively new ransomware strain. Reports from Bleeping Computer claim that Conti “is being operated by the same group that conducted Ryuk ransomware attacks in the past”.

Sanjay Jagad, senior director of products and solutions at Cloudian, tells Digital Journal that ransomware is posing a very real and increasing threat: “The ransomware attack on the US Criminal Court highlights ransomware’s extraordinary power to interrupt operations, expose critical data and ruin reputations.”

He adds that there are particular institutions that are a greater risk than others: “While ransomware threatens organizations of all types, government agencies are increasingly vulnerable, due to outdated technologies and inadequate defenses resulting from tight budgets.”

This means new and more imaginative counter strategies are required, as Jagad says: “With ransomware attacks costing government agencies over $7.5 billion in 2019, it’s clear stronger defense measures are needed.”

One answer is by implementing Object Lock technology. This is is an Amazon Web Services S3 feature. According to ZDNet it “blocks object version deletion during a customer-defined retention period so customers can enforce retention policies as an added layer of data protection or for regulatory compliance.”

Jagad recommends the use of Object Lock technology “at the data storage layer makes backup data unchangeable, meaning it cannot be encrypted by hackers. As a result, organizations can quickly and easily recover an uninfected copy of their data in the event of an attack and avoid having to pay a ransom.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

World

US President Joe Biden delivers remarks after signing legislation authorizing aid for Ukraine, Israel and Taiwan at the White House on April 24, 2024...

Business

Meta's growth is due in particular to its sophisticated advertising tools and the success of "Reels" - Copyright AFP SEBASTIEN BOZONJulie JAMMOTFacebook-owner Meta on...

Business

The job losses come on the back of a huge debt restructuring deal led by Czech billionaire Daniel Kretinsky - Copyright AFP Antonin UTZFrench...

Tech & Science

TikTok on Wednesday announced the suspension of a feature in its spinoff TikTok Lite app in France and Spain.