CYBER Insights » THREAT INTEL: Ransomware us Once – Shame on you, Ransomware us Twice – Shame on us.

THREAT INTEL: Ransomware us Once – Shame on you, Ransomware us Twice – Shame on us.

Cybersecurity
Image_RichardPatterson_Flickr_Ransomware

Gibraltar: Friday 21 June  2024 at 10:50 CET

THREAT INTEL: RANSOMWARE – Ransomware us Once – Shame on you, Ransomware us Twice – Shame on us.

By Andy Jenkinson – Guest Contributor |  Group CEO Cybersec Innovation Partners
via IainFRASER.net/CYBERInsights
First for SME Cybersecurity News
Google Indexed on 210624 at 11:30 CET

#SMECyberInsights #SMECyberNews #Cybersecurity #WhitethornShield #InternetSecurity #Cybercrime #DNS #PKI

Ransomware us Once – Shame on you, Ransomware us Twice – Shame on us. Plus a $50 million Ransom…

Several months ago Synnovis Italy suffered a cyberattack that resulted in disruption and chaos. Despite this intrusion, Synnovis failed to identify, address, or remediate their exposed and insecure servers.

Synnovis lack of action placed thousands of patients at risk. Synnovis and those patients remain at the same, if not increased risk.

Despite the first and subsequent attack on the 4 June 2024, Synnovis and NHS servers remain insecure despite our information sharing and offers to help all concerned. Including the Information Commissioner’s Office.

The first and second attacks were easily enabled and facilitated the extraction of data via insecure Internet Assets and insecure servers.

A robbery, any robbery cannot take place without access being gained. That fact is the same for any physical, or digital theft.

Despite having one of the best Intelligence Agencies in the world, it is surprising that Synnovis and the NHS remain so exposed. However, a similar attack on the UK’s The Electoral Commission servers also remain insecure despite the data theft of 41 million UK Citizens from Aug 2021 to Oct 2022 when our Intelligence Agency also were parachuted in.

This incident clearly demonstrates inadequate knowledge, complacency, or complicit behaviour. Given Chris Streather, the Chief Medical Officer of NHSE London actions after we shared information we are very concerned at the conduct and ignorance despite being presented with information and evidence.

NHS have at least two cyberattacks in flight currently, this and the Dumfries and Galloway attack. Both share the same exposed and insecure third-party servers. It is no coincidence the same insecure servers are used by The Electoral Commission, Synnovis, Medibank, UnitedHealth Group and thousands more cyberattack victims including SolarWinds.

With Elections upon us, politicians need to wake up to the fact no GDP growth or cost savings will ever keep pace with the costs and losses of self inflicted cyber costs and losses.

As Churchill so eloquently said; ”You cannot reason with a tiger when your head is in its mouth.”

Cybersec Innovation Partners
GCHQ
FBI Cyber Division
The White House
Central Intelligence Agency
BBC News
CNBC
Fox News Media
ITV
WhitethornShield
InternetSecurity
DNS
PKI

 

About Andy Jenkinson

Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech & Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset & DNS Vulnerabilities.

Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years’ experience as a hands-on lateral thinking CEO, coach, and leader. A ‘big deal’ business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100’s £ millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world’s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.

Translate »