The world is now facing an unprecedented wave of coordinated cyber attacks,

0

An “unprecedented” and “coordinated” wave of cyber attacks is hitting many VoIP services in the UK. So says the Comms Council UK (which until early this year was called the Internet Telephony Services Providers Association (ITSPA)), the trade organization representing and supporting telecommunications companies that provide services to commercial and residential customers. Members include network operators, service providers, resellers, suppliers and consultants.

The organization claims that for the past month, its members have been and still are the targets of DDoS (Distributed Denial of Service (DDoS)) attacks in an attempt to extort money from them. He says the incursions “appear to be part of a coordinated international campaign focused on extortion by professional cybercriminals” and that “ransom threats have been made against many vendors and a global threat has been made against the whole. We have never seen anything like it since our inception in 2004. With characteristic composure, UK regulator Ofcom simply confirms that it is “aware of the situation.” Meanwhile, the Comms Council UK is ensuring liaison with government and National Cyber ​​Security Center (NCSC) as well as Ofcom.

Often categorized as unsophisticated “brutal” attacks, the reality is that, despite tremendous advancements in technology that offer vastly improved protection, when a DDoS incursion is successful, it can be devastating. Commenting on the idea that brute force attacks are primitive, Brian Higgins, security specialist at Comparitech, the popular and influential website providing information, tools, reviews and comparisons to help consumers in the UK, in North America and many other parts of the world to improve. their cybersecurity and online privacy, said, “It is very naive to think of DDoS as an unsophisticated attack vector.

Like most criminal methodologies, it has evolved over time to become a very useful tool for cybercriminals. It is often a distraction vehicle while other data breach activity takes place, but it is just as useful as a ransomware technique. Ransomware is based on the inaccessibility of data, and while typically achieved through network infiltration and encryption, denial of access is just as effective, albeit for a shorter period of time. The VoIP service providers currently under attack have clearly taken the best approach in informing and liaising with the relevant authorities. While it may take some time to resolve the issue, their customers should be patient and attentive, follow the advice provided, and be confident that this approach will make the industry a much less attractive target in the future. “

495 million known ransomware attacks so far this year

Meanwhile, Milpitas, Calif., Based network security, appliance and internet security specialist today released its “The Year of Ransomware” report which shows that in the third quarter this year, attacks have increased 148%. The 495 million known attacks this year (and who knows how many millions more that went unreported?) Make 2021 the worst on record – and there are still a few months left in this murky year. SonicWall predicts that as of January 1, 2022, there will have been 714 million ransomware attacks.

SonicWall, the world’s most cited ransomware expert, reveals that its customers averaged 1,748 ransom attempts in the third quarter alone, equivalent to 9.7 ransomware attempts per customer for every business day. That’s really bad, but not as potentially terrible as the 307,516 “never-before-seen” malware variants that the company’s in-depth real-time memory inspection product discovered in September. Overall, there has been a 33% increase in IoT malware attacks globally, with the most prevalent being in the United States and Europe. There was also a 21% increase in the incidence of cryptojacking, with Europe inundated by a massive 461% growth wave.

Cryptojacking is malicious cryptomining performed when cybercriminals hack both work and personal computers, laptops and mobile devices to install hidden software. When in place, the software uses the power and resources of a computer to mine cryptocurrencies or steal cryptocurrency wallets belonging to unsuspecting victims. The code is easy to deploy, runs in the background, and is very difficult to detect.

Earlier this month, as TelecomTV reported, the Biden administration in the United States hosted a global ransomware summit and pledged to use “all national tools” to stop cyber attacks on industries. reviews. The problem is, the answer probably came too late to prevent some shocking and disastrous attacks. SonicWall President and CEO Bill Conner said, “In our opinion, ransomware is on an almost unimaginable uptrend, posing a major risk to businesses, service providers, governments and businesses. ordinary citizens. The actual damage caused by these attacks is beyond the anecdote at this point. It is a serious national and global problem that has already taken its toll on businesses and governments around the world. I hope the recent Global Ransomware Summit will be the next step towards a greater response at the global, national and state levels.

If so, and it should be, it has to be quick. The ransomware juggernaut is moving at an ever increasing speed and it will beat the defenses of some big and very important companies. government departments, agencies and organizations and cause catastrophic problems unless action is taken now. We now know that to date 2021 is the worst year for ransomware attacks, that they multiply daily and proliferate like the Covid-19 virus.

As Dmitriy Ayrapetov, vice president of platform architecture at SonicWall, says, “The techniques deployed by ransomware players have evolved well beyond the smash-and-grab attacks of a few years ago. barely. Today’s cybercriminals are demonstrating deliberate recognition, planning, and execution to surgically deploy toolchains targeting corporate and government infrastructure. This results in larger victims and leads to higher ransoms. He adds, “As long as organizations continue to ignore or fail to implement cybersecurity best practices to reduce their attack surface, ransomware groups will only increase investments in time, resources and in cash to launch campaigns that result in massive payouts.

Mysterious hacking group spies on subscribers from mobile operators themselves

To make matters worse, hackers are breaking into computer telecommunications networks around the world to spy on users from the operators themselves. According to cybersecurity firm Crowdstrike, they gain access to mobile infrastructure to spy on anyone whose device connects to these networks. It seems that this mysterious coterie has been active since 2016, has developed its own tools to hack mobile networks and knows a lot more than it should about its targets.

Crowdstrike of Sunnyvale, Calif., Provides cloud endpoint and workload security, threat intelligence and cyber attack response and knows what it is. He says the information hackers can steal “aligns with information that may be of significant interest to signal intelligence organizations,” but the highly sophisticated hackers themselves remain unknown – apparently.

However, a major clue is being followed. Crowdstrike discovered that data was being sent to and from a remote server, and compromised networks were encrypted with a readable password in the code of the hacking tools themselves. The password? “Wuxianpinggu507”, a Chinese expression which translates to “wireless evaluation 507”. Crowdstrike is quick to point out that just because a developer knows a bit of Chinese, it doesn’t necessarily follow that the Chinese government is involved. On the other hand, others are not so circumspect say, “If he waddles like a duck, quacks like a duck, and tastes good roasted in hoisin sauce, it is most likely a duck.” These are murky waters, and Chinese ponds can be particularly muddy. We’ll see what’s what in the end though. Probably a duck bottom.


Source link

Leave A Reply

Your email address will not be published.