Connect with us

Hi, what are you looking for?

Tech & Science

Looking behind the North Korea cyberattack on Pfizer (Includes interview)

North Korean hackers have attempted to break into the computer systems of Pfizer, according to The Washington Post. This was due to a search for information on the COVID-19 vaccine and treatment technology, according to a South Korean lawmaker. Pfizer has not commented on the situation, leaving details vague on when the hack occurred or how successful the hackers might have been.

Looking at the issue for Digital Journal is Rusty Carter, Chief Product Officer of LogRhythm.

Carter says that the issue shows the extent of the threat that rogue states face: “This is a high-profile reminder that espionage is both prevalent and an existential threat to businesses across industries. Within the current global economy, that can include state sponsored activities to extract proprietary and business critical data.”

There is also a focus on the healthcare sector, as Carer notes: “No industry is more visible right now than biotech and vaccine development companies, though many others continue to be rich targets due to their profitable industries. This type of espionage and proprietary information loss is a critical threat to organizations worldwide.”

In terms of the specific issue, Carter states: “Unfortunately, it is not a surprise that North Korea has attempted to hack a pharmaceutical company like Pfizer in order to obtain important information about the development of the COVID-19 vaccine and treatment technology. Nation-states have been targeting the U.S. for decades, but SolarWinds was a clear escalation. Now, the rules of engagement are set and companies need to be aware that multiple nations, including North Korea, possess similar capabilities and are targeting organizations that hold powerful information, especially as it relates to the COVID-19 pandemic.
While it is still unclear how successful these hackers were, it does serve as an important reminder that attacks on healthcare organizations and other critical infrastructure are a very real threat. Organizations must be hyperaware of risks posed by nation-states and not just national hackers and groups.”

Cater also considers what the attackers could be doing with these types of data: “Securing proprietary information and assets requires a number of physical and electronic measures, and common to all security and risk management programs is strong detection and response capabilities. Especially in today’s virtual world, detecting and responding to sophisticated network attacks is crucial.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

The arrival of ChatGPT sent shockwaves through the journalism industry - Copyright AFP/File JULIEN DE ROSAAnne Pascale ReboulThe rise of artificial intelligence has forced...

World

Taiwan's eastern Hualien region was also the epicentre of a magnitude-7.4 quake in April 3, which caused landslides around the mountainous region - Copyright...

World

A Belgian man proved that he has auto-brewery syndrome (ABS), which causes carbohydrates in his stomach to be fermented, increasing ethanol levels in his...

Tech & Science

Middle-earth Enterprises & Friends will manage the intellectual property rights Embracer has for "The Lord of the Rings" and the "Tomb Raider" games -...