Connect with us

Hi, what are you looking for?

Tech & Science

Telecom Argentina hit with $7.5 million ransom (Includes interview)

The hacking group has put in a demand for $7.5 million in ransom, against the major telecommunications provider. InfoSecurity reports that the firm’s official website is currently down and local reports suggested that employees started having trouble accessing internal VPNs and databases as early as July 15, 2020. Furthermore, following the and that sum will supposedly double after three days. The incident did not cause any damage to the ISP’s customers, but the company’s official websites have been down since July 18, 2020, and 18,000 computers have been infected after the hackers gained control of an internal domain administration.

In addition to demanding a ransom, the hacking group behind the incident are also known to steal a portion of locked data first and then encrypt the malware.

To gain an insight, Mark Bagley, VP or Product at AttackIQ looks into the issue for Digital Journal.

According to Bagley,the scale and significance of this specific attack is high: “This is likely to be one of the more expensive ransomware attacks this year.”

Focusing on the weaknesses that enabled the attack to happen, the analyst opines: “A security program that included network segmentation, preventing the lateral movement of an adversary would have been decisive in mitigating this situation. Legacy approaches that focus on stopping an adversary at their initial attempts to access targets of interest will continue to fail. Companies must design their security programs to minimize the impact when an adversary successfully infiltrates their network.”

in terms of what needs to be done in order to put control measures in place, Bagley says: “This control of lateral movement is imperative to preventing many other adversary behaviors. Preventing an adversary from using credentials harvested from one system elsewhere in the network – a technique called “credential stuffing” when automated – is one crucial way organizations can reduce the damage of an attack.”

Issuing a stark warning for the future, Bagley concludes: “Given the increases in sophistication and automation that have been observed in recent attacks, it’s not enough to address cyberthreats as they happen. A proactive cybersecurity approach is vital and should include continuous testing of security posture to identify exposures and improve defenses before adversaries apply exploits to them.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

Financial AI could be used for something other than destroying the world.  

Business

Asian markets stumbled out of the gates Monday, extending last week's grim start to the year.

World

Palestinian villager Ghadeer al-Atrash in front of her bulldozed home in Al-Walaja - Copyright AFP INDRANIL MUKHERJEEAnuj CHOPRADabbing away tears, Ghadeer al-Atrash stood before...

World

The US presidential election will pose the greatest political risk to the world in 2024 no matter who wins.