Hacking Attacks Against Corporations Have More Than Doubled in the Last Month

Illustration for article titled Hacking Attacks Against Corporations Have More Than Doubled in the Last Month
Illustration: AP

Since the massive shift to remote work last month, hacking activity targeting U.S. corporations and businesses other countries has more than doubled, Reuters reported. According to software and security company VMWare Carbon Black, ransomware attacks rose a whopping 148 percent in March compared to February and the months prior. It seems hackers are taking advantage of the effects the covid-19 pandemic has had on most companies.

Advertisement

Having a decentralized workforce makes it easier for hackers to gain access to a company’s systems, even if employees use VPNs (virtual private networks). Data is not only dispersed much more widely than it would be in an office, but most employees aren’t using identical computer setups when they log into the company network remotely.

“It’s just easier, frankly, to hack a remote user than it is someone sitting inside their corporate environment,” VMWare cybersecurity strategist Tom Kellerman told Reuters. “VPNs are not bullet-proof, they’re not the be-all, end-all.”

Advertisement

Businesses without the means to extend their security networks beyond their offices may rely on VPNs more heavily for their remote workers. But this sharp rise in VPN usage has allowed hackers to find more security holes than before. It’s harder for an IT department to update VPNs because they can be used 24/7, especially with employees across different time zones or varying working hours. Normally, an IT department could apply security updates and fixes across all company computers at a designated time or when an employee shuts down their computer for the day. But with the covid-19 pandemic forcing millions of workers out of the office and into the home, that is no longer the case.

Remote employees can also be more susceptible to unsecured websites that usually try to steal your credit card information by getting you to buy non-existent or shoddy products. That risk is still there even if you are using a work-issued computer remotely; infected machines that were once protected by a company’s security network may not have that same security extended to them remotely and can become easier targets for hackers.

Case in point: The Department of Homeland Security recently revealed that hackers who broke into Pulse Secure’s VPNs a year ago were able to maintain that access. The DHS publicly announced this vulnerability last October, with a follow-up about continued exploitation in January.

In its most recent press release, the DHS said: “Unpatched Pulse Secure VPN servers continue to be an attractive target for malicious actors. Affected organizations that have not applied the software patch to fix an arbitrary file reading vulnerability [...] can become compromised in an attack.”

Advertisement

However, even companies who have applied the patches are still being targeted by hackers who had previously stolen passwords and other sensitive information. According to ZDNet, this allowed hackers to bypass the VPN’s security measures, and then the company’s own, to easily steal intellectual property or install ransomware or malware on the company’s internal network.

Staff Reporter, Reviews at Gizmodo. Formerly PC Gamer, Maximum PC.

Share This Story

Get our newsletter

DISCUSSION

sergioar
Unspiek Baron Bodissey

Flipping nuisances. Every week or so the same guy with different names emails me to demand $2000 in BTC, showing me some long discarded password