All the information related to our products at your disposal:
Trends
Trends, Blog
Large-scale cyberespionage, used on numerous occasions to violate the cybersecurity of organizations and obtain their critical data, is no exception in the renewable energy industry, which, according to Bleeping Computer, has experienced a large-scale attack campaign in the last three years. Thus, according to this media, up to fifteen recognizable entities around the world have suffered different impacts caused by professional hackers.
The attack campaign, orchestrated with the objective of stealing the access credentials of the employees of these renewable energy companies in order to access the desired information, has been executed from the domains “*.eu3[.]biz”, “*.eu3[.]org” and “*.eu5[.]net”, through phishing techniques focused on compromised websites with Brazilian domains. This wave was discovered by security researcher William Thomas, part of the Curated Intelligence Trust, through the application of OSINT (open source intelligence) techniques such as DNS scans and public sandbox submissions.
These analyses revealed that the cyberespionage attacks, whose exact impact on the renewable energy industry is still unknown, were carried out using unsophisticated but effective phishing technology such as the “Mail box” custom toolkit, combined with the aforementioned compromised legitimate websites to host phishing pages. Furthermore, and although he cannot attribute this campaign to a specific actor, the evidence obtained by Thomas points to two main groups of activity: one from APT28 (FancyBear) and another from Konni (based in North Korea).
Preventing cyberattacks involves having the necessary tools for a powerful security network. Situations such as digitalization, with its consequent exposure of data, and new work models, with multiple connections from unknown networks, mean that the security systems we have known until now have become stagnant.
Therefore, today, the data-digitalization binomial must be add a third leg: cybersecurity, which involves deploying advanced solutions that guarantee the security of IT teams and the teams responsible for operational processes. And this applies to any sector.
Ikusi’s cybersecurity solution monitors web traffic, combining security and control mechanisms applied to web browsing, email, and cloud applications (SaaS) to reduce risks derived from the use of these platforms and protect the organization and its customers. Something for which the company, with more than 50 years of experience in the sector, offers a demo to protect you thanks to the application of intelligence that fights against threats on multiple fronts
This cybersecurity solution inspects traffic and applies policies that restrict access to unauthorized or risky websites, blocks the reception of unwanted emails (SPAM) or those with malicious attachments. Additionally, it detects risks and anomalies in the behavior of common SaaS applications, such as logins from unauthorized locations or the sending of confidential or sensitive information outside the organization.
This solution is based on the combined application of best-in-class tools, such as Cisco Secure Email, which blocks ransomware delivered via spam and phishing emails; Cisco Umbrella, improving security visibility and detecting compromised systems; Cisco Secure Endpoint, protecting against endpoint ransomware; Cisco SecureX, which radically reduces dwell time and human-intensive tasks; Cisco Secure Access by Duo, which prevents adversaries from using stolen credentials to establish a foothold; and Cisco Secure Network Analytics, which provides agentless network problem detection and network traffic monitoring.
Share this post
renewables
industry
cyberespionage
hackers
Hacking
IT
Phishing
security
cybersecurity
Nombre
Departamento
Unidad de negocio:
¿Por qué te interesa formar parte del equipo LEAP?
¿Qué experiencia o perspectiva crees que puedes aportar al equipo?
¿Has participado anteriormente en iniciativas relacionadas con la igualdad de género o diversidad?
¿Tienes disponibilidad para participar en reuniones periódicas (presenciales o virtuales)?
🗣 ¿Hay algo más que te gustaría compartir o proponer en relación con esta iniciativa? (Este espacio es libre para cualquier idea, sugerencia o reflexión que quieras aportar.)