Tag Archive for: Operations

Inside Russia’s attempts to hack Ukrainian military operations : NPR


In this photo illustration, the 502 Bad Gateway message is seen on Ministry of Defence of Ukraine official webpage displayed on a smartphone screen and flag of Ukraine in the background.

SOPA Images/LightRocket via Getty Images


hide caption

toggle caption

SOPA Images/LightRocket via Getty Images

In this photo illustration, the 502 Bad Gateway message is seen on Ministry of Defence of Ukraine official webpage displayed on a smartphone screen and flag of Ukraine in the background.

SOPA Images/LightRocket via Getty Images

KYIV, Ukraine — Ukrainian intelligence officials have revealed details to NPR about an attempt by Russian state hackers to penetrate Ukrainian military planning operations systems.

The hackers from Russian military intelligence captured Android tablet devices used by Ukrainian officers on the front lines in an attempt to spy, according to a report published by the Security Service of Ukraine’s Cyber Security Situation Center.

“We saw that there were attempts to penetrate these systems,” said Illia Vitiuk, the head of the Cybersecurity Department of Ukraine’s Security Services, also known as the SBU. Vitiuk spoke to NPR in an exclusive interview in Kyiv on Wednesday.

“Our enemy is extremely focused on getting insight into these systems,” he continued.

The Ukrainian military uses multiple tools for situational awareness to track Russian troop positions and gather other intelligence from the land, air and sea. Those include Delta, a military platform developed by the Defense Technology Innovation and Development Center within Ukraine’s Ministry of Defense, and Kropvya, a defense mapping software made by Ukrainian NGO Army SOS. Developers working on these systems in Kyiv are becoming increasingly aware of Russia’s focus on them, and are declining to openly discuss the platforms and how they work to…

Source…

The Global Impact of Ransomware on Business Operations and How to Stay Protected


Understanding the Global Impact of Ransomware on Business Operations and Strategies for Protection

Ransomware, a type of malicious software designed to block access to a computer system until a sum of money is paid, has become a global menace, causing significant disruptions to business operations worldwide. The global impact of ransomware on business operations is profound, with companies of all sizes and across all industries falling victim to these cyber-attacks.

In recent years, the frequency and sophistication of ransomware attacks have increased dramatically. Cybercriminals are now targeting not only large corporations but also small and medium-sized businesses, which often lack the resources and expertise to defend against such attacks. The consequences of a successful ransomware attack can be devastating, leading to significant financial losses, operational disruptions, and reputational damage.

According to a report by Cybersecurity Ventures, the global cost of ransomware is expected to reach $20 billion by 2021, up from $325 million in 2015. This staggering increase underscores the growing threat that ransomware poses to businesses around the world. Moreover, the actual cost of ransomware is likely much higher, as many attacks go unreported due to fear of reputational damage or regulatory penalties.

The global impact of ransomware extends beyond direct financial losses. Businesses affected by ransomware often experience significant operational disruptions as they struggle to restore their systems and recover their data. These disruptions can last for days or even weeks, leading to lost productivity and missed business opportunities. In some cases, businesses may be forced to shut down operations entirely until the ransomware issue is resolved.

Furthermore, ransomware attacks can have a lasting impact on a company’s reputation. Customers, partners, and stakeholders may lose trust in a company that has fallen victim to a ransomware attack, particularly if sensitive data is compromised. This loss of trust can lead to lost business and can take years to rebuild.

Given the significant global impact of ransomware on business operations, it is crucial for businesses to…

Source…

ScanSource ‘Has Resumed’ Operations After Ransomware Attack


Security News


Mark Haranas


ScanSource tells CRN that after “tireless work,” the company has now resumed regular business operations after being hit by a ransomware attack more than two weeks ago.

 ARTICLE TITLE HERE
ScanSource’s official homepage was back online as of Tuesday.


ScanSource tells CRN it was resuming normal “business operations” following a ransomware attack this month that crippled some of its digital systems and caused customer outages.

The IT services and telecom distributor confirmed on May 16 that it had been hit by a ransomware attack that created issues with some of ScanSource’s basic digital systems, including its website, which impacted customers and suppliers in North America.

ScanSource told CRN today that any issues stemming from the attack are now over.

“As a result of the diligent and tireless work of our teams, ScanSource has resumed business operations,” said a ScanSource spokesperson in an email to CRN.

[Related: ScanSource Ransomware Attack: 5 Big Things To Know]

Furthermore, the Greenville, S.C.-based company said it was “excited” to be serving its channel partners once again.

“We are excited to be back serving our channel partners and helping to grow their businesses. Thank you to our partners and suppliers for their patience and support,” ScanSource said.

ScanSource Ransomware Attack

ScanSource is a global tech distributor that connects devices to the cloud for customers across hardware, SaaS, connectivity and cloud computing.

On May 16, ScanSource sent out a release explaining that it was subject to a ransomware attack, which was initially discovered by the company on May 14. The ransomware attack impacted employees, customers and suppliers for several days. The company pointed to North America and Brazil as among the affected geographies.

ScanSource immediately began investigating the attack while also implementing its incident response plan.

“ScanSource is actively managing the…

Source…

UK’s offensive hacking force plans to scale operations to meet government’s demands


The UK’s National Cyber Force (NCF) has revealed plans to scale operations amid rising demands from the government to ramp up offensive hacking capabilities.

In a report offering a unique insight into the NCF’s ongoing expansion, the offensive cyber force said it needs to “scale up to meet the requirements government has of it” and is rapidly expanding personnel and capabilities to meet current demand. 

The NCF is currently in the process of establishing a new permanent base of operations as Samlesbury in Lancashire, which it said will enable the force to “increase operational output”. 

Samlesbury, a 45-minute drive from GCHQ operations in Manchester, was selected as the site for the NCF headquarters in 2021.

As part of this expansion and recruitment drive, the NCF revealed that it plans to further invest in offensive hacking capabilities to contend with escalating global threats. 

The report said that “significant capability investment” will be required to “keep pace with the changing nature of technology” and mitigate increasingly sophisticated cyber threats currently faced by the UK. 

The NCF specifically highlighted rapid technological developments as a key operational challenge, noting that “fundamental changes to the future shape of the internet and globalisation of technology could raise significant complications”. 

“Our adversaries are global and use a wide array of cyber and digital technologies,” the report said. “We need to have the technical ability and readiness to reach these adversaries wherever they are and irrespective of how they are using cyber technology.”

Closer integration with defence partners, including GCHQ, the Ministry of Defence (MOD), and the Secret Intelligence Service (SIS) will also be a key objective for the NCF moving forward.

The NCF noted that it must “integrate effectively with other parts of government and with a wider range of partners and allies”. 

This includes law enforcement, government policy departments, the private sector, and a “growing number of international allies”. 

“More broadly, we are working with the private sector, academia, think tanks, and wider civil society to harness the best…

Source…