Connect with us

Hi, what are you looking for?

Tech & Science

REvil ransomware demand has Apple in its sights (Includes interview)

Apple store in Beijing. - AFP
Apple store in Beijing. - AFP

The REvil crew claims it came into possession of Apple product data after breaching Quanta Computer, a Taiwanese company that is the biggest laptop manufacturer in the world and which is also one of the companies that assemble official Apple products based on pre-supplied product designs and schematics.

In a message posted on a dark web portal where the ransomware gang usually threatens victims and leaks their data, the REvil gang said that Quanta refused to pay to get its stolen data back and, as a result, the REvil operators have now decided to go after the company’s primary customer instead.

The REvil group have posted 21 screenshots depicting MacBook schematics as proof for the infiltration and threatened to release new blueprints every day until either Apple pay the demand.

Looking into the issue for Digital Journal is Gary Ogasawara, CTO, Cloudian.

Ogasawara says of the incident: “If targeted by ransomware, businesses should be aware that their attacker’s threat can permeate into their customer channels until the attacker achieves its financial goal.”

Ogasawara notes that the incident is a sign of the increasing sophistication of cyberattacks: he says: “As ransomware tactics continue to advance, companies must act now to strengthen their defenses.”

Hence, there are things that businesses can put in place to address these types of cyberattacks. Ogasawara notes in particular: “The strongest defense begins with how sensitive data is stored. Organizations will often encrypt their backup data thinking it will be safe and accessible should a threat arise, but the primary data is then left vulnerable to exposure once a cybercriminal is past initial perimeter security.”

For rock-solid measures, Ogasawara advises: “To ensure complete safety, organizations should employ encryption, both for data at rest and for data in flight.”

This is especially: “By combining encryption and immutable (unchangeable) storage backups, data is protected from the attacker attempting to steal the data or and/or holding it for ransom.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

The groundbreaking initiative aims to provide job training and confidence to people with autism.

Tech & Science

Microsoft and Google drubbed quarterly earnings expectations.

Entertainment

Steve Carell stars in the title role of "Uncle Vanya" in a new Broadway play ay Lincoln Center.

Business

Catherine Berthet (L) and Naoise Ryan (R) join relatives of people killed in the Ethiopian Airlines Flight 302 Boeing 737 MAX crash at a...