At the same speed as cybernetic security and monitoring systems are improved, so is the sophistication and volume of malware created by hackers around the world. Two years ago the WannaCry ransomware spread by encrypting thousands of computers in more than 150 countries in a matter of hours. Hijackers like Wanna Cry are called "ransomware" and some of them have been wreaking havoc a long time ago. But this one impressed by the speed with which it spread and by the extent of infected computers in what appeared to be a coordinated cyber attack. It was the first time that ransomware, a malware that encrypted a user's files and required rescue crypto-coins to unlock them, hit hospitals, government systems, rail networks and private companies.
According to recent data from Shodan, a database and device search engine, up to 1,7 million points connected to the Internet are still vulnerable to WannaCry in the US. But this represents only devices connected directly to the Internet and not the millions of devices connected to servers that have been infected, that is, not yet fully stagnant. In addition, the advent WannaCry can not be considered just an isolated incident in the past. He was the one with the greatest repercussion, but not the only one.
In May, for example, the US Department of Homeland Security (DHS) and the FBI issued a joint alert on new malware created by the North Korean hacking group APT Hidden Cobra. There are indications that the North Korean government supports the group and it is speculated that the government itself has launched cyber attacks against media, aerospace, financial and critical infrastructure organizations around the world. The Hidden Cobra was also associated with the threat of WannaCry itself, in addition to the ransomware hack, which invaded Sony Pictures in 2014 and the attack on SWIFT Banking on 2016.
Another case of humor, which happened this year, was that of Binance. The global Crypto-Coin Stock Exchange trades more than 100 coin types and is considered the largest in the world in terms of volume, announced on its official website a serious breach of security. Hackers were able to get a giant number of users' API keys, authentication codes and other information, using phishing, viruses and other attacks. The invaders managed to steal 7 a thousand bitcoins in one fell swoop. The list of cases is extensive and demonstrates the constant need for protection. In the counter-attack, recently, WhatsAp corrected a severe vulnerability being exploited by intruders to remotely install surveillance malware on some "selected" smartphones by simply calling the target phone numbers through an audio call. According to the CEO of TI Safe, Marcelo Branquinho, it is not possible to guarantee security in automation networks with a single solution or measure. He explains that cyber threats are very varied and dynamic. That's why organizations need a multi-layered security strategy for all their systems. "This approach ensures that intruders have to overcome several independent obstacles before they can cause real damage. This discourages attackers and gives organizations more time to recognize and block serious threats, "notes Marcelo.
To know more, visit: malware control