Connect with us

Hi, what are you looking for?

Tech & Science

Telecom Argentina hit with $7.5 million ransom (Includes interview)

The hacking group has put in a demand for $7.5 million in ransom, against the major telecommunications provider. InfoSecurity reports that the firm’s official website is currently down and local reports suggested that employees started having trouble accessing internal VPNs and databases as early as July 15, 2020. Furthermore, following the and that sum will supposedly double after three days. The incident did not cause any damage to the ISP’s customers, but the company’s official websites have been down since July 18, 2020, and 18,000 computers have been infected after the hackers gained control of an internal domain administration.

In addition to demanding a ransom, the hacking group behind the incident are also known to steal a portion of locked data first and then encrypt the malware.

To gain an insight, Mark Bagley, VP or Product at AttackIQ looks into the issue for Digital Journal.

According to Bagley,the scale and significance of this specific attack is high: “This is likely to be one of the more expensive ransomware attacks this year.”

Focusing on the weaknesses that enabled the attack to happen, the analyst opines: “A security program that included network segmentation, preventing the lateral movement of an adversary would have been decisive in mitigating this situation. Legacy approaches that focus on stopping an adversary at their initial attempts to access targets of interest will continue to fail. Companies must design their security programs to minimize the impact when an adversary successfully infiltrates their network.”

in terms of what needs to be done in order to put control measures in place, Bagley says: “This control of lateral movement is imperative to preventing many other adversary behaviors. Preventing an adversary from using credentials harvested from one system elsewhere in the network – a technique called “credential stuffing” when automated – is one crucial way organizations can reduce the damage of an attack.”

Issuing a stark warning for the future, Bagley concludes: “Given the increases in sophistication and automation that have been observed in recent attacks, it’s not enough to address cyberthreats as they happen. A proactive cybersecurity approach is vital and should include continuous testing of security posture to identify exposures and improve defenses before adversaries apply exploits to them.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

World

The world's biggest economy grew 1.6 percent in the first quarter, the Commerce Department said.

Business

Electric cars from BYD, which topped Tesla as the world's top seller of EVs in last year's fourth quarter, await export at a Chinese...

World

Former US President Donald Trump attends his trial for allegedly covering up hush money payments linked to extramarital affairs - Copyright AFP PATRICIA DE...

Business

A diver in Myanmar works to recover a sunken ship in the Yangon River, plunging down to attach cables to the wreck and using...