Hackers are increasingly targeting critical Canadian infrastructure: spy agencies | Cybersecurity News

The agency reported that there were 235 ransomware attacks against Canadian targets this year, half of which were critical infrastructure providers.

The Canadian Signal Intelligence Agency reported that global ransomware attacks in the first half of 2021 increased by 151% compared to 2020, as hackers became increasingly shameless.

Canada’s main infrastructure is often targeted Ransomware attack The Communications Security Agency (CSE) stated in a report released on Monday that hackers basically held computer information as hostages until they were paid.

The agency stated that it knew 235 Ransomware incident Targets for Canada from January 1 to November 16 this year. More than half are critical infrastructure providers, including hospitals.

“The targets of ransomware operators may become more and more aggressive, including targeting critical infrastructure,” said a report released by the Canadian Cyber ​​Security Center under CSE.

According to Reuters, by 2021, the global average total cost of recovering from a ransomware incident has more than doubled to US$1.8 million.

CSE reiterated that participants came from Russia, China and Iran pose serious threats to the network infrastructure of countries such as Canada.

“Russian intelligence and law enforcement agencies will almost certainly keep in touch with cybercriminals through associations or recruitment. As long as they focus their attacks on targets outside Russia, they can operate with almost impunity,” CSE said.

SolarWinds hacker anniversary

When the Canadian government report was released, a US cybersecurity company warned that since the large-scale attacks last year, attacks by Russian elite hackers have hardly decreased. SolarWinds cyber espionage Targets U.S. government entities, including the Department of Justice and corporations.

On the anniversary of the public disclosure of the SolarWinds intrusion, the US cybersecurity company Mandiant stated that hackers associated with the Russian SVR foreign intelligence agency continued to steal data “related to Russian interests.”

The hacking activity was named SolarWinds after the American software company whose products were used in the first phase of the infection. Moscow has repeatedly denied responsibility for this hacking attack.

Charles Carmakal, CTO of Mandiant, said that although the number of US government agencies and companies that were attacked by SVR this year was less than last year, about 100 organizations were compromised at the time, making it difficult to assess the damage.

Carmakal said: “Not everyone is disclosing this incident[s] Because they don’t always have to legally disclose it,” which complicates the loss assessment process. But the overall effect is still more serious. “The hacked company is also losing information,” he said.

Mandiant did not identify individual targets or describe specific information that could be stolen, but did state that the unspecified “diplomatic entity” receiving malicious phishing emails was one of the targets.

Management U.S. President Joe Biden In April last year, sanctions were imposed on SolarWinds’ hacking, including six Russian companies that supported the country’s cyber efforts.



Source link

Leave a Reply

Your email address will not be published.