What We Can Learn from the City of Kingman’s Criminal Cyberattack
A massive cyberattack targeted the Arizona City of Kingman’s technology infrastructure in early March. While categorized by officials as a “criminal...
1 min read
Megan Schutz August 8, 2021
Ransomware attacks are on the rise and as prevalent as ever. As they steamroll ahead, with cybersecurity teams and the government trying to stay one step forward, attackers continue to evolve with new strategies to make a buck any way that they can.
The latest is this: cybercriminals have been directly emailing employees and asking them to unleash malware inside their employer’s network in exchange for a commission of sorts—the hackers will pay the employee a portion of the ransom paid by the victim company (reference). This latest strategy proves attackers will continue evolving to attack profitable enterprises in pursuit of million-dollar ransoms.
Here’s an example of what to look out for:
In the example above, an employee was offered 40% of a million-dollar ransom in exchange for launching malware on his employer’s network, according to threat intelligence agency Abnormal Security.
While many employees will recognize ill intentions, decline the offer, and report the attempt to your IT security team, some other employees may consider it. For disgruntled or unhappy employees, such an offer can serve as an opportunity.
As an employer, part of proactive IT security means identifying that employees can be a risk entry point. As much as you may not want to consider that an employee would be disloyal, refusing to acknowledge this potential risk could open you up to unnecessary cybersecurity risks.
Unfortunately, no — this is not a new problem. While cybercriminals may be new to the idea, organizations have long since fallen victim to disgruntled employees, both present and past. As always, be sure you are performing proper offboarding for former employees to protect your organization. Be sure network access is revoked, necessary passwords are changed, and account logins are eliminated. Check out our related blog: 10 Steps to Proper Employee Offboarding for IT Security.
If you have questions or need help building a successful IT infrastructure to protect your organization, reach out to PK Tech here.
A massive cyberattack targeted the Arizona City of Kingman’s technology infrastructure in early March. While categorized by officials as a “criminal...
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...
The dental industry is one of the latest industries under attack from dire cybercriminals, with many crooks taking advantage of weaknesses exposed...