Security News
A ransomware attack on a U.S. natural gas compression facility led to a two-day shutdown of operations, according to an alert from the Cybersecurity and Infrastructure Security Agency. From there, attackers planted what the agency called "Commodity ransomware" within both networks that encrypted data throughout the facility.
An unnamed US gas pipeline operator has falled victim to ransomware, which managed to encrypt data both on its IT and operational technology networks and led to a shutdown of the affected natural gas compression facility, the Cybersecurity and Infrastructure Security Agency has revealed. "Although the direct operational impact of the cyberattack was limited to one control facility, geographically distinct compression facilities also had to halt operations because of pipeline transmission dependencies. This resulted in an operational shutdown of the entire pipeline asset lasting approximately two days."
A ransomware infection at a natural gas compression facility in the United States resulted in a two-day operational shutdown of an entire pipeline asset, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency revealed on Tuesday. A compression facility helps transport natural gas from one location to another through a pipeline.
The U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency earlier today issued a warning to all industries operating critical infrastructures about a new ransomware threat that if left unaddressed could have severe consequences. The advisory comes in response to a cyberattack targeting an unnamed natural gas compression facility that employed spear-phishing to deliver ransomware to the company's internal network, encrypting critical data and knocking servers out of operation for almost two days.
The U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency earlier today issued a warning to all industries operating critical infrastructures about a new ransomware threat that if left unaddressed could have severe consequences. The advisory comes in response to a cyberattack targeting an unnamed natural gas compression facility that employed spear-phishing to deliver ransomware to the company's internal network, encrypting critical data and knocking servers out of operation for almost two days.
Election officials in Palm Beach County, Florida, revealed this week that its voter registration system was hit by ransomware in the weeks leading up to the 2016 presidential election, according to the The Palm Beach Post. On Wednesday, Wendy Sartory Link, the recently appointed election supervisor of Palm Beach county, acknowledged that the government voting system sustained a previously undisclosed ransomware attack in mid-September 2016, according to the news report.
Ransomware brings a business to a screeching halt every 11 seconds, making it the most pervasive and destructive malware threat out there. With fast-evolving ransomware strains, protecting your business means it is essential to take on so-called zero-day attacks that slip by traditional anti-virus defenses.
Businesses and individuals lost $3.5 billion to cybercriminals last year while reporting more incidents of internet crime to the FBI than any year previously, according to the bureau's Internet Core Competency Certification 2019 Internet Crime Report, which was released on Tuesday. People reported 467,361 complaints of cybercrime to the FBI in 2019-an average of nearly 1,300 incidents every day, and more than 100,000 more than the year prior, according to the report.
A kernel-level Windows driver for old PC motherboards has been abused by criminals to silently disable antivirus protections, and hold files to ransom. When the ransomware infects a computer - either by some other exploit or by tricking a victim into running it - and loads the driver, the operating system and antivirus packages will allow it because the driver appears legit.