More and more obsessed with Canadian weapons: The spy agency | Cybersecurity issues

[ad_1]
The Agency reports 235 casualties in Canada this year, half of which were major donors.
Global threats to redemption increased by 151 percent in the first half of 2021 compared to 2020, the Canadian intelligence agency said, with more and more thieves.
Major Canadian construction projects have been under constant scrutiny ransomware attacks the way thieves steal computer information until they are paid, the Communications Security Establishment (CSE) said in a report released Monday.
The council is aware of 235 ransomware events against Canadian targets from January 1 to November 16 this year. More than half were providers of essential services, including hospitals.
“Ransomware users can be extremely aggressive in pursuit of their own interests, combined with the necessary tools,” the report released the Canadian Center for Cyber Security, part of the CSE.
The average cost of recovering from the redemption process doubled to $ 1.8m worldwide in 2021, Reuters reported.
The CSE also said that actors from Russia, China and Iran posed a serious threat to the development of technological instruments such as Canada.
“Russian law enforcement agencies and law enforcement agencies maintain ties with cybercriminals, either through alliances or recruitment, and allow them to operate more efficiently as long as they focus on terrorists outside Russia,” the CSE said.
SolarWinds Reminder
The Canadian government’s report comes after a US company warned that terrorist attacks against Russian civilians have not decreased since last year. SolarWinds cyber-espionage campaign targeting US government agencies, including the Department of Justice, and companies.
On the day of commemorating the public disclosure of SolarWinds’ intrusion, US Internet security company Mandiant said the terrorists affiliated with the Russian intelligence agency SVR continue to steal “information that is in line with Russia’s interests”.
The fraudulent campaign was called SolarWinds based on a US software company that was used to cause the first infection. Moscow has repeatedly denied any wrongdoing.
Although the number of U.S. state-owned enterprises and companies hijacked by SVR was lower this year than last year, while another 100 corporations were liquidated, assessing that damage is critical, said Charles Carmakal, Mandiant’s chief technical officer.
Carmakal said “not everyone is disclosing what happened[s] because they do not always have to disclose it legally ”, disrupting the audit process. But all the consequences are far-reaching. “Companies that are being robbed, are also losing a lot,” he said.
Mandiant did not name what he wanted to do or explain what had been stolen but said unnamed “agencies” that received fraudulent emails were among those wanted.
Authority of US President Joe Biden handed down sanctions last April in response to the SolarWinds hack, including six Russian companies that support national experiments.
[ad_2]
Source link



