Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Comment from Forcepoint on warnings from US that Chinese hackers are targeting coronavirus research

May 2020 by Nicolas Fischbach, Chief Technology Officer, Forcepoint

The US has claimed hackers working for the Chinese government are trying to steal valuable research on coronavirus vaccines and treatments from U.S. health care, pharmaceutical and research organisations.

Nicolas Fischbach, Chief Technology Officer, Forcepoint explain:

“It’s inevitable that organisations dealing with sensitive data related to coronavirus will be prime targets for cyber-attacks, data theft in particular. In recent times we’ve seen a specific increase in attackers targeting employees, using tactics such as phishing to compromise accounts. In fact, our X-Labs team saw a rise in unwanted emails (malicious, spam or phishing) containing embedded URLs using the keywords of COVID or Coronavirus from negligible values in January 2020 to over half a million blocked per day the end-of-March onwards. As hackers now target people, not silicon, organisations need cyber security solutions that address that.

We’re operating in a heightened environment where nation states – as well as cybercriminals acting for financial gain – can exploit the associated human stressors with our current situation to get to money or valuable intellectual property by exploiting the work-from-home model or hiding in the noise generated by all these on-going changes in the infrastructure.

It’s therefore critical for organisations to understand the context behind user interactions with data and systems – for instance, security teams can respond faster if they knew someone was acting outside of their normal work routine or were trying to access files they typically don’t interact with. Having the ability to observe behaviours and adapt protection to changing levels of risk is critical to preventing and mitigating cyberattacks.

If they happen, breaches will also often leave a digital trail or breadcrumbs, such as emails, web traffic or uncommon application use that indicate unusual behaviour, which organisations should learn from to shore up their defences in the future.”


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts