What can we learn from the latest cybersecurity breaches
The frequency and impact of cybercrime has been steadily escalating for several years now, but 2017 has been one of the worst– at least in terms of media headlines. Worse still, we’re only half way through the year.
So what has happened, and what can you learn?
NSA hacking tools are stolen and leaked
The National Security Agency – the US body responsible for “intelligence” – maintains an impressive array of tools that allow their analysts to hack computers belonging to foreign spies, terrorists or suspected criminals. Many of these tools use vulnerabilities that had were previously unknown even to the most successful cybercriminals.
However, these tools were stolen and leaked online earlier this year. Details of the exploits were also published on Wikileaks, throwing a spotlight onto US intelligence activity. Once the NSA tools were leaked, hackers immediately began to use them against innocent people.
How to protect yourself:
The NSA tools work by exploiting gaps and bugs in operating systems and software, like Windows 8 or Apple’s MacOS. You should regularly check for updates, and install patches as quickly as possible – this closes the loopholes used by the hackers, rendering their malware ineffective.
The WannaCry outbreak
Ransomware has been gaining popularity in recent years as a way to extract extort money from people by infecting their computer and encrypting their files. The only way to recover data is to pay a ransom to the hackers.
In May, WannaCry went global, infecting thousands of computers across the world. In the UK, several NHS trusts were affected, taking clinical systems offline, and forcing the cancellation of planned operations as engineers tried to reverse the damage.
Although the source of the WannaCry infection remains in dispute, security analysts agree that the malware uses one of the vulnerabilities exposed in the NSA theft. Some believe that the outbreak was planned by the North Korean government as a way to raise revenue – however the malware was more effective than expected, leading to the global outbreak.
The Petya outbreak
Just one month after WannaCry wreaked havoc, another malware variant burst onto the scene. Using the same NSA exploits, Petya (also known as NotPeya, Nyetya and Goldeneye) managed to compromise several major companies, including pharmaceutical giant Merck, shipping company Maersk and the Russian oil firm Rosnoft.
Unlike WannaCry which was global in its reach, Petya appears to have been targeted at businesses in Ukraine. The central bank, several power companies and the public transport network were particularly badly affected.
How to protect yourself:
The success of the NSA hacking tools relies on security vulnerabilities that are not known by a software vendor, and have not yet been repaired, called zero day exploits. Every computer is in danger of being exploited until these loopholes are closed.
You can improve protection by installing an anti-malware tool
Anti-malware cannot detect zero day exploits, but it can recognise malware by the way it acts – and block it automatically before damage is done to your data.
In fact, you can (and should) install an anti-malware tool like Panda Security. Download a free trial of Panda Security now, and you’re well on the way to protecting your data through the rest of 2017.
60 comments
Thanks for sharing the cool article. I learnt some cool things today.
We are glad you learnt new things with us! Thanks for reading us!
NSA leak and WannaCry ransomeware were the worst nightmare for the tech industry. Thank you so much Panda Security team to keep up all updated.
Thank you for reading us!
Best regards,
Panda Security.
The viruses like ransomeware and trojan used to be very worst for every pc user. Thanks a lot for providing info about that. Thanks Panda Team.
Thanks for reading us!
Best regards,
Panda Security.
Thanks for useful information and need more secure measure too to protect the things
Thank you for reading us!
Best regards,
Panda Security.
I think that it is one great article on Cyber Security Breaches. Really helpful for me.
Thanks for reading us!
Best regards,
Panda Security.
Really great service of pandasecurity.
Best Regards.
This is really great article on Panda Security. Really alarming for us to save the instinct.
Thanks a lot for your comment, we are glad to know you find our content useful!
Best regards,
Panda Security.
Really great service of pandasecurity.
Best Regards.
Mr tweak
Thanks for reading us! We are glad you are happy with our service.
Best regards,
Panda Security.
This is a really very informative blog post for everyone to know how to secure privacy. Hoping to continue the professional approach. Thanks for sharing.
Thanks for reading us, Davis!
Best regards,
Panda Security.
Thanks for being on top of these security breaches for us.
Thanks for reading us!
Best regards,
Panda Security.
If you like to change your phone ringtone freely then you must have searched the internet looking for free ringtones for your phone. You must have realized till now that it is not an easy task to find the best ringtone
Thanks for this info about cyber security.
Thanks for reading us!
Best regards,
Panda Security.
We love to read this info about cybersecurity again and again
We are glad you find our information interesting!
Thanks for reading us!
Best regards,
Panda Security.
Nice Articles, Thanks for this info about cyber security.
really nice articles, thanks for this
Thanks for reading us!
Best regards,
Panda Security.
awesome post man.
Thanks for reading us!
Best regards,
Panda Security.
Wow, I was reading this article and let me tell you that information is absolutely amazing. I just want to thanx for it. As I was looking for the same sort of Article.
good one
Amazing Content just want to thanks for.
Thanks for reading us!
Kind regards,
Panda Security.
today everybody tries to have a one of a kind, highlight stuffed Smartphone that can draw in the consideration of spectators
You absolutely hammered it. Such a nice article.
Hi Jamie!
Glad to know you like our content!
Kind regards,
Panda Security.
Todays everyone should know about these cybersecurity breaches. Thanks for sharing this awesome article
Thanks for your feedback and for reading us!
Kind regards,
Panda Security.
Thanks for sharing this nice article. Absolutely amazed by your work.
Thanks for reading us!
Kind regards,
Panda Security.
Cyber security breaches is great absolutely great so far. Nice that you shared this information.
Free Ringtones for Android & iPhone: Have you heard of some newly released tune and want to set it as your device’s ringtone
thanku so much for share post and learn about cybersecurity.
Thanks for reading our blog!
Kind regards,
Panda Security.
Thanks for the amazing article.
Cyber Security Is really important to large companies these days as hackers are trying to snatch their information.
I am agreeing that cyber security is one of the biggest theft to companies containing personal information of common people. Which can lead to big misuse.
PandaSecurity Providing great information regarding cybersecurity
Panda security is really helpful for me regarding to cyber security because my websites had been facing several cyber security for 1 year.
This is very nice and helpful and enjoy the system
Cyber Security is one of the biggest threat to the local as well as international business. But you are giving suitable information regarded to Cyber security and helping young entrepreneurs.
The info is great for 2017 but a humble request that please write on Cyber Security breaches of 2019
Hi Jessica,
You can take a look at our PandaLabs reports for 2018: https://www.pandasecurity.com/en/mediacenter/security/figures-cyberthreat-evolution-2018/ Or our predictions for 2019: https://www.pandasecurity.com/en/mediacenter/pandalabs/annual-cybersecurity-report-2018/
But you can check our blog to keep up with the latest cybersecurity news and malware attacks, as we have reported so far in 2019 with the biggest data leak in history: https://www.pandasecurity.com/en/mediacenter/pandalabs/annual-cybersecurity-report-2018/ or Zurich vs Mondelez: the vast costs of large-scale cyberattacks: https://www.pandasecurity.com/en/mediacenter/tips/zurich-vs-mondelez-vast-costs-cyberattacks/
We hope this helps!
Thanks for reading us.
Best regards,
Panda Security.
I also had the same Question. Thanx
Thanx Alot…
nice post, thanks for sharing!
very fewer people who are sharing about security and cyber related articles
With the Help of Social Engineering Cyber security has reached to another level. Anyway that’s a great coverage.