Connect with us

Hi, what are you looking for?

Tech & Science

Looking behind the ConnectWise ransomware attacks (Includes interview)

ConnectWise is a Florida-based company that provides remote IT management solutions, and it has been subject to a ransomware attack, according to ZDNet. Following the attack, more than 100,000 IT professional users have been advised to block access to ConnectWise Automate servers.

It remains unclear, as Search Security reports: “when the attacks occurred, what type of ransomware was used, how many ConnectWise customers were targeted and if any of the ransomware attacks were successful.”

To understand a little more about this type of attack, Digital Journal checked in with James Carder, CISO and VP of LogRhythm Labs.

Carder explains why cyber-criminals are turning to ransomware: “Threat actors and criminals always look for the easiest way to break into an organization, while also being the most covert.”

With ransomware specifically, cyber-criminals have a key goal in mind, according to Carder: “In cases like ransomware, the goal is to use the initial access into the environment to move to and compromise as many systems as possible. This allows the attacker to rapidly inflict as much pain as possible, bringing the company to its knees and maximizing the attacker’s reward.”

For ransomware to work, there needs to be a weak fragment in any company’s security protocols. According to Carder: “The most obvious entry point that satisfies this scenario is an approved, privileged, understood, knowledgeable, and centralized system used to manage a company’s computer systems. If an attacker compromises that system, he gets unfettered access to the entire environment. Moreover, he can thwart many security operations teams.”

All too often this ends up being remarkably easy, as Carder notes: ” Installing software (since ransomware is nothing more than software) is likely standard operating procedure for that system, so it still appears to be acting normally. This tactic is nothing new to security incidents and breaches; nation state threat actors and others have used it for decades.”

This means that companies need to focus on the basics when it comes to cyber security, looking at different entry points that cyber-criminals might be keen to exploit and then putting appropriate systems in place.

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

The groundbreaking initiative aims to provide job training and confidence to people with autism.

Tech & Science

Microsoft and Google drubbed quarterly earnings expectations.

Business

Catherine Berthet (L) and Naoise Ryan (R) join relatives of people killed in the Ethiopian Airlines Flight 302 Boeing 737 MAX crash at a...

Entertainment

Steve Carell stars in the title role of "Uncle Vanya" in a new Broadway play ay Lincoln Center.