Posted on May 12, 2017
Ransomware Is Escalating To a Near Nation State Attack in the UK
1.62K
34
15
3
3
0
Posted >1 y ago
Responses: 2
It's a growth sector. No overhead, low startup costs and with all the tactics reasonably low risk. With spoofing and VPN's they make it extremely hard to catch them. International boundaries and variations with laws create another challenge. I know someone that had a lower level attack and I think we can expect to see more of it. There was a WH presser yesterday addressing IT issues such as this. They are starting to look at the entire US government more as an Enterprise vs. the current system of each Dept. or Agency doing their own thing. That will make it easier to conduct a mass attack due to everyone being connected. I guess this is why they got serious many years back with Cyber Command, 10th Fleet and the rest. Is it serious enough though? Thanks for sharing.
(4)
(0)
CWO3 (Join to see)
Maj Kevin "Mac" McLaughlin - I agree and also posted vehemently against the concept. Your plan sounds more feasible. The idea of folks sitting in a Command Center not having a clue how to react to a conventional attack screams against no basic training. Rear Area Security alone is a disqualifier for the proposal. I doubt it is being seriously considered but more of a teaser to gain attention and kick off the debate.
(0)
(0)
CWO3 (Join to see)
SSgt GG-15 RET Jim Lint - That's our plan here also. We have the standard software and firewall stuff. I debate whether we are using the best software because of all the manipulation of internet reviews, but it seems to work. I realize that even the best measures fall short for a professional hacker attack. But I constantly reinforce with wife that if anything goofy happens "back away from the PC and do nothing until you tell me". The majority of these attacks are self inflicted due to people surfing shady sites. It's hard to resist when a link says "free download" but the rule of thumb is just don't do it. If you do then scan it in quarantine before installing, but I choose just to avoid it. I've also gotten the bogus email spear-phishing scheme a few times. It's the one that says you need to change your password. After a couple of those I realized that we are all dancing on the edge, and one click away from being owned. Education and avoidance are key.
(0)
(0)
SSG Robert Webster
Maj Kevin "Mac" McLaughlin - Amen!
It starts with the basics.
But what bothers me the most about all of this particular instance - medical facilities that could not or would not do their job because of the lack of information access. What happened to the fall back plan for when the electricity and batteries fails?
Electronic systems are wonderful and better and medical facilities can provide better and faster care when everything works correctly, but it appears that those same institutions to include some government agencies and entities and others have shown and proven through what has happened, that they are not prepared for catastrophic failure of what has now become supposedly an indispensable part of modern life.
It starts with the basics.
But what bothers me the most about all of this particular instance - medical facilities that could not or would not do their job because of the lack of information access. What happened to the fall back plan for when the electricity and batteries fails?
Electronic systems are wonderful and better and medical facilities can provide better and faster care when everything works correctly, but it appears that those same institutions to include some government agencies and entities and others have shown and proven through what has happened, that they are not prepared for catastrophic failure of what has now become supposedly an indispensable part of modern life.
(0)
(0)
SSgt GG-15 RET Jim Lint
Maj Kevin "Mac" McLaughlin - Actually, the Intell Community (IC) does have the ability go to 12 steps vice 10 steps. It was used in the past, it was still available in 2014.
(0)
(0)
I think it speaks to a level of ignorance of people in general. The information is out there not to click on a link received from someone they don't know, or if the message is questionable. Many companies have unenforced rules about looking at personal email while at work, or going to web sites that are questionable, and yet people still do these things. This is the biggest threat to a companies security, is the employees. But, so many people think they have a right, not a responsibility. Most spam, TOS Attacks, Ransom-ware, etc... is code that comes from social engineering, not a forward attack, but, one from inside
(0)
(0)
Read This Next