Connect with us

Hi, what are you looking for?

Tech & Science

Caught out: U.S. Court in ransomware attack (Includes interview)

According to CBR, targeting ‘a successful’ (from the point of view of the hackers) ransomware attack directly a U.S. court is thought to be the first ransomware attack of its kind,in terms of documents and court data being exfiltrated and published. After stealing the Louisiana court documents, which reportedly related to witnesses, jurors, and defendant pleas, the hackers posted proof of the hack attack on its Dark Web page.

The agent for the attack was Conti, a relatively new ransomware strain. Reports from Bleeping Computer claim that Conti “is being operated by the same group that conducted Ryuk ransomware attacks in the past”.

Sanjay Jagad, senior director of products and solutions at Cloudian, tells Digital Journal that ransomware is posing a very real and increasing threat: “The ransomware attack on the US Criminal Court highlights ransomware’s extraordinary power to interrupt operations, expose critical data and ruin reputations.”

He adds that there are particular institutions that are a greater risk than others: “While ransomware threatens organizations of all types, government agencies are increasingly vulnerable, due to outdated technologies and inadequate defenses resulting from tight budgets.”

This means new and more imaginative counter strategies are required, as Jagad says: “With ransomware attacks costing government agencies over $7.5 billion in 2019, it’s clear stronger defense measures are needed.”

One answer is by implementing Object Lock technology. This is is an Amazon Web Services S3 feature. According to ZDNet it “blocks object version deletion during a customer-defined retention period so customers can enforce retention policies as an added layer of data protection or for regulatory compliance.”

Jagad recommends the use of Object Lock technology “at the data storage layer makes backup data unchangeable, meaning it cannot be encrypted by hackers. As a result, organizations can quickly and easily recover an uninfected copy of their data in the event of an attack and avoid having to pay a ransom.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Business

From “prompting parties” to low-code agents, the future of enterprise AI depends on how people learn, not just what tools they use, says PWC’s...

Tech & Science

When it comes to video apps, the Davy recommends manually adjusting the quality settings rather than accepting the default ones.

Entertainment

"Adult Children" is a new coming-of-age dramedy that stars Betsy Brandt, Aya Cash, Ella Rubin, Thomas Sadoski, and Mimi Rogers.

Tech & Science

Vera Rubin Observatory in Chile published their first images on Monday, revealing breathtaking views of star-forming regions.