当前位置:网站首页>The world's largest meat processor has been "blackmailed", how many industries will blackmail virus poison?
The world's largest meat processor has been "blackmailed", how many industries will blackmail virus poison?
2022-06-24 12:21:00 【Tencent security】
Global blackmail virus events are breaking out , And gradually, the unit of measurement is week .
Local time 5 month 31 Japan , The world's largest meat supplier JBS openly , The company's servers were systematically attacked by hackers , Computer networks have been shut down in several branches around the world , Wholesale meat prices in the United States have risen . The global food supply chain, which has been hit by the epidemic, has become even worse .
Only three weeks ago , The largest product pipeline operator in the United States Colonial Pipeline Ransomware attacks ……
The workers stopped work and the factory stopped production , The global food supply chain is in turmoil
This time, it was attacked by hackers JBS The company is the world's largest meat processor , As report goes , The total value of meat exported by the company to the world last year 136 Billion dollars , China accounts for nearly one third of them .JBS It is also the largest meat processing enterprise in the world , Annual revenue exceeds 500 Billion dollars , In Fortune Global 500 Ranking No 191 position , In the world 20 Many countries have meat processing plants , There are as many employees worldwide 24 More than one .
JBS Global business layout , Let this network attack trigger the butterfly effect .
JBS Express , At present, the main affected markets are North America and Australia . As report goes ,JBS All beef factories in the United States were forced to shut down , According to industry estimates ,JBS Roughly controls the United States 20% Slaughtering capacity of cattle and pigs . The shutdown caused by the attack has had a significant impact on the U.S. meat market .
USDA data shows , Tuesday , U. S. Meat Processors slaughtered fewer cattle than last week 22%; The number of pigs slaughtered has decreased compared with last week 20%. in addition , Wholesale prices have also risen accordingly . And in Canada , There are also some. JBS Plant shutdown .JBS It is also the largest meat processor in Australia , Thousands of local employees have stopped work for two consecutive days on Monday and Tuesday .
Although there is no direct evidence that the incident was started by “ Blackmail virus ”, But according to the attacker's choice to attack the company's system over the weekend , It is likely to involve extortion software .
Similar incidents have been common in the first half of this year .《2021 Blackmail virus trend report and protection scheme suggestions in the first half of the year 》 It shows that , Even though 2021 Compared with the same period last year, the first half of , The attack posture of blackmail virus has decreased slightly , But extortion incidents are still frequent , only 2021 First quarter , There have been many cases of extortion of internationally renowned enterprises , And the ransom continues to set a new record .
Which industry will be targeted next ?
Perhaps no industry can ensure that it will survive the attack of blackmail virus . Observe from the security incidents that have occurred so far , Any person 、 organization 、 Almost all the agencies are within the range of blackmail virus .
From the initial mischief , Up to now, there have been frequent malicious attacks , Why can extortion virus be as “ Weeds, ” Strong vitality , Wanton growth ?《 The report 》 Also made a detailed explanation :
First , Blackmail virus encryption means are complex , Decryption cost is high ; secondly , Use electronic money to pay ransom , Converted into cash quickly 、 Tracking is difficult ; Last , The emergence of blackmail software service , So that the attacker does not need any knowledge , As long as you pay a small amount of rent, you can carry out illegal activities of extorting software , Greatly reduce the threshold of blackmail software , Promoted the large-scale outbreak of extortion software .
According to the characteristics of extortion virus with high incidence in the market ,《 The report 》 The means of transmission of blackmail virus are divided into 6 A direction : Weak password attack 、U Disk worm 、 Software supply chain attack 、 System / Software vulnerability 、“ No documents ” Attack technology 、RaaS. Extortion virus gangs use these means of transmission to invade the target system , Will use tools to upload the confidential data of the lost network to the server , Then blackmail .
With the continuous acceleration of global digitalization , More and more enterprises are moving their business to the cloud . Due to the high value of enterprise user data , However, many enterprises are not fully prepared for the cloud network security situation . So for some time to come , Targeted attacks against enterprise users , Will be one of the important targets of blackmail virus . And with the popularization of Technology 、 The maturity of blackmail virus industry chain , Viruses will also become more diverse 、 High frequency .
But there is a clear consensus that : Bulk commodities and social infrastructure are the key targets of extortion virus . Li Tiejun, a network security expert at Tencent, said ,“ In the past two years , Through observation, we found that the target of network attack has become more and more clear , The enterprises that bear the brunt are those that hold a large amount of business data . Who has the higher value of data , The more vulnerable someone is to hackers .”
Whether to pay ransom , It should not be the only way to solve the problem
Because of the high cost of unlocking the encrypted file , So when blackmail happens , The only choice left to enterprises is to pay ransom or restore and rebuild .
Statistics display , Over the past few years , The total amount of ransoms paid for hacker attacks worldwide is rising , It soared significantly last year 311%, Close to the 3.5 Billion dollars . And more threats are hidden in 3.5 After $100 million : The ransom payment cannot be decrypted 、 There is no guarantee that there are other vulnerabilities 、 raise the price at the transaction location ……
In the face of an endless stream of extortion viruses , Whether enterprise or individual users , Should pay attention to network security measures , Take precautions in advance . Tencent security suggests that enterprises should follow “ Three no three ” The principle is to build a defense system in advance .
besides , Targeted deployment of security measures is also a way to deal with . Enterprise users shall install and deploy terminal security management software throughout the network , It is recommended to use Tencent zero trust borderless access control system (iOA); For some large and medium-sized enterprises , Tencent advanced threat detection system is recommended (NTA) Monitor intranet risks . meanwhile , Enterprise users can also subscribe to Tencent security threat intelligence products , Make all security devices in the whole network have the same threat discovery as Tencent security products 、 Defense and clearance capabilities .
边栏推荐
- OpenGL es shared context for multi-threaded rendering
- I'm in Shenzhen. Where can I open an account? Is it safe to open an account online now?
- 打新债可以申请多少 开户是安全的吗
- Turn 2D photos into 3D models to see NVIDIA's new AI "magic"!
- Easynvr user login is modified to share the modification process of ip+ user name restriction
- 【老卫搞机】090期:键盘?主机?全功能键盘主机!
- GLOG from getting started to getting started
- The latest hot spot: the use of copper death related genes for tumor prognosis typing!
- 炒伦敦金短线稳定赚钱技巧?在哪里炒伦敦金安全靠谱?
- Realization of alarm clock with AHK
猜你喜欢
How to write controller layer code gracefully?
【直播回顾】战码先锋第七期:三方应用开发者如何为开源做贡献
How to develop hospital information system (his) with SMS notification and voice function
GLOG从入门到入门
u盘安装kali并且持久化
Opencv learning notes -- Separation of color channels and multi-channel mixing
GTest从入门到入门
[mysql_16] variables, process control and cursors
Database migration tool flyway vs liquibase (II)
如何优雅的写 Controller 层代码?
随机推荐
炒伦敦金短线稳定赚钱技巧?在哪里炒伦敦金安全靠谱?
Coinbase will launch the first encrypted derivative product for retail traders
qt -- QTabWidget 中支持拖拽TabBar项
计组-总复习
Deep learning ~11+ a new perspective on disease-related miRNA research
Popular science of data annotation: ten common image annotation methods
怎样打新债具体操作 开户是安全的吗
12+!不同癌症中TMB与ICI反应之间的免疫相关因素研究
ArrayList # sublist these four holes, you get caught accidentally
【云驻共创】解读HarmonyOS 应用与服务生态
What should music website SEO do?
Google Earth engine (GEE) - how to add a legend in the map panel
Programmers spend most of their time not writing code, but...
Kubernetes best practice: graceful termination
How to purchase new bonds is it safe to open an account
嵌入式必学!硬件资源接口详解——基于ARM AM335X开发板 (上)
LS-DYNA新手入门经验
《梦华录》要大结局了,看超前点映不如先来学学它!
How can I open an account with new bonds? Is it safe
Speculation London gold short-term stable money making skills? Where is it safe to fry London gold?