User Identity and Access Management – What’s the Deal with IDP?
What user identity is? Why managing access is essential for businesses? How an IDP (Identity Provider) works? You will find the answer to these questions in the article.
We invite you to the second part of our considerations on ransomware (part 1 available here). What are real cases of attacks, and what are good defense practices in cyberspace for your company? We welcome you to read on!
Cases from other companies
One of the most prominent cases in recent years was the attack on Norsk Hydro, a giant in the aluminum industry. The attackers managed to gain access by having an employee open an email attachment that came from a trusted source (the mailbox of a trusted individual was compromised and used in the attack). Within a few days, the attackers were able to establish continuous access to the infrastructure, which they subsequently encrypted. This case is significant not only due to the financial scale (the company lost over 40 million dollars) but also because they chose to be transparent about it. They kept the company informed in real-time about the ongoing situation and how the IT teams were combating the threat, working to restore the company’s operations. If you’d like to read more about this topic, we recommend an article on Microsoft’s website regarding this specific attack.
Another significant ransomware attack that affected hundreds of thousands of computers worldwide was the so-called WannaCry. In 2017, hackers known as the Shadow Brokers exploited an advanced vulnerability called EternalBlue in the Windows operating system. This vulnerability was said to have originated from the U.S. National Security Agency (NSA) and had reportedly been used by government hackers (APT groups). EternalBlue targeted a flaw in the Microsoft Server Message Block 1.0 (SMBv1) protocol, using it to gain remote execution access to the victim’s computer with delivered code. Moreover, the virus had the capability to self-propagate across networks. Entities such as hospitals, universities, and automobile manufacturers were among those affected. The ransomware screen demanding payment even appeared on ATM screens
Figure 1 – Program window appearing after the execution of the WannaCry ransomware.
Figure 2 – Infected ATMs in China.
Best Practices
So, how can you protect yourself from ransomware attacks? There isn’t a single answer to that question because each company’s infrastructure is slightly different. However, you can adhere to generally accepted good security practices that will help minimize the threat and, in case of an attack, allow you to effectively recover your data.
Before we delve into tips specifically about ransomware, we encourage you to familiarize yourself with general security advice that Innokrea offers on our blog:
In addition to the practices we recommend, here’s what you should consider:
Summary
We hope this short series on ransomware has been useful and intriguing for you. Remember that we’re never completely safe in the cyber realm, but by employing proper cybersecurity practices and hiring knowledgeable individuals, we can protect our businesses and, in the event of a successful attack, minimize the losses incurred by the company. See you next week!
Sources:
User Identity and Access Management – What’s the Deal with IDP?
What user identity is? Why managing access is essential for businesses? How an IDP (Identity Provider) works? You will find the answer to these questions in the article.
Security
Hey, hey... Programmer, this is another article for you! The second part of the article on design patterns. Get to know Adapter and Memento.
Programming
Programmer, this article is for you! Grab a handful of useful information about design patterns.
Programming