Course Hero Logo

Shubi 7922 1112 pm topic 45 discussion modules 3 4

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 16 - 19 out of 81 pages.

Shubi
7/9/22, 11:12 PMTopic: 4.5 Discussion Modules 3 & 417/81ReplyReferenceWilde, C. (2022, June 8).Why you need to set up two-factor authentication ASAP. Reader's Digest. Retrieved June 14, 2022, from(httpAndrew Burch()Jun 19, 2022ReplyHello Seungbae,I really enjoyed this because I have not heard about this before now. MFA could have prevented the hacker from gaining access to itsinternal systems and threatening to stop production of the fuel pipeline. The attackers stole 100 gigabytes of data within a two-hourwindow. Following the data theft, the attackers infected the Colonial Pipeline IT network with ransomware that affected many computersystems, including billing and accounting. There were court documents indicated that investigators traced bitcoin transaction records toa digital wallet, which they subsequently seized under court order. This was a fantastic read and I enjoyed learning about this.(https://Nathan Biar()Jun 7, 2022Garmin is a well-known world leader in the fitness, aviation, and maritime industries. In July of 2020, Garmin was targeted by a Russianhacking group named Evil Corp with an attack using Wastedlocker ransomware. Ransomware is used to encrypt a user or business's files
7/9/22, 11:12 PMTopic: 4.5 Discussion Modules 3 & 418/81and then demand payment for a key to decrypt and restore the data. Ransomware attacks are generally widespread attacks meant toinfect as many systems as possible to increase the chance of receiving payment for decryption. This attack was unique in that themalicious code was specifically designed to target Garmin (Geronimo 2020).The attack brought down the online services used by their many fitness and GPS-reliant devices. The devices themselves wereunaffected but were unable to connect to receive updates. Garmin supplies avionics packages used throughout aviation. If these devicesare unable to update through Garmin's servers, the end-user would eventually be left with expired maps and navigation data. In this case,the attack was launched a week after the 28-day update cycle for FAA was published (Das 2020). The attackers could have increasedtheir leverage on Garmin by deploying the attack days before the update, leaving its aviation customers without the necessary informationto conduct flight operations. Additionally, the attack's effect was lessened by the reduction in air travel related to the COVID-19 outbreak.The hackers demanded a payment of $10 million for the decryption key. By using targeted attacks, Evil Corp. reduced the distribution ofits software, limiting its exposure to white hat groups who may have been able to render it useless. Instead, Wastedlocker contains noknown weaknesses, which left Garmin with the difficult decision to pay for the decryption key or lose their data. While no public commentshave confirmed the payment, a ransom was likely paid to the group to restore the data. While not part of the hacker's scheme, the factthat the group is sanctioned also poses difficult choices to victims as transactions with the group would be illegal. Garmin likely paid theransom through a third party to avoid adding illicit transactions to the company's list of problems (Abrams 2020).

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 81 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
BRADLEY
Tags
Computer Security, Test, The Land, Target Corporation, Security token

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture