Saturday, November 16, 2024
HomeSecurity NewsNorth Korean Hackers Threaten to Attack Irish companies with 'almost daily' Attacks

North Korean Hackers Threaten to Attack Irish companies with ‘almost daily’ Attacks

Published on

State-Sponsored Hackers from North Korea targeting Irish companies, banks, and utilities almost every day.They are likewise suspected to be in charge of the €4.3m cyber heist on Meath County Council in October 2016.

Why Ireland targeted by North Korea Hackers?

Ireland is considered as a target due to the presence of many US Multinationals, Defense Minister Paul Kehoe said we will be rapidly upgrading Ireland’s capability of defending against cyber attacks.

The cost of hacking attempts on Irish organizations has taken off from €498,000 in 2014 to €1.7m in 2016 – with examiners cautioning it is probably going to increment exponentially finished future years.

The number of cyber attacks experienced by Irish businesses increased between 2012 and 2016, but that figure is supposed to increase or even treble because of modern ransomware attacks.

- Advertisement - SIEM as a Service

Also Read Leading research and advisory firms Forrester was hacked

“There were always certain unspoken rules in terms of cyber warfare between countries and intelligence services,” Mr. Murphy said.
“But North Korea has thrown the entire rule book out the window. It is basically engaging in cyber warfare to raise funds and to cause global chaos. Reported Independent IE.

According to a nationwide cybersecurity awareness survey, over 171,000 businesses in the State could be vulnerable to crippling ransomware attacks.

Murphy said that the WannaCry ransomware assault which caused worldwide chaos not long ago was abused by North Korean leader Kim Jong-un’s cybersecurity services.

A review found that 26pc of organizations have experienced digital assaults in the previous two years, with a further 18pc uncertain in the event that they have been influenced.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...