ITT 307 Topic 2 DQ2
docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
307
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
1
Uploaded by PeanutButterEater102
Attackers are always searching for new attack vectors and vulnerabilities. Most of these attacks target computing systems to gain access to information. In recent years, a new type of cybercriminal focuses on monetary gain. Ransomware is one type of monetary gain tool used by cybercriminals. Identify at least three attacks that are current. What did they do? Were they successful? How were they spread? Would you recommend a client to pay the ransom or not? How can you protect yourself from this type of attack?
Hello professor and class,
One of the attacks that I found happened August of 2022 and affected all one hundred seventy five 7-
eleven stores in Denmark. The hackers used ransomware that affected operating solutions so the stores could not use mobile pay or cash registers. Fortunately the hackers did not get any money and the stores were able to return to operations the next day. Another attack that occurred between April and May 2022 was the Glenn County Office of Education. The District gave $400000 to the hacker group under the promise to delete the data and walk them through how they infiltrated their system. The information they stole included names and emails, addresses, and social security numbers of parents/ students. One of my favorite attack stories from last year involved Cisco experiencing a data breach. This
was due to an employee logging into their personal Google account on a company device. The hackers used voice phishing to bypass the multifactor authentication settings. They were detected before they could install ransomware, but they claimed to have 55 GB of data. I would advise against a client paying a ransom because there is no stopping them from attempting to attack again since they were already successful. To protect yourself from this type of attack it is crucial to have highly trained cybersecurity personnel, antivirus and antimalware software in use, firewall rules heavily enforced, multifactor authentication, and keep backups of important files hidden but easily accessible. Also it should be common knowledge not to allow employees to log into personal emails and accounts on company devices.
References
DISSENT. (2022, June 15). Glenn County Office of Education paid $400k ransom after ransomware attack.
databreaches.net. https://www.databreaches.net/scoop-glenn-county-office-of-education-paid-400k-
ransom-after-ransomware-attack/
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help