Worst hacker attacks in various countries

Worst hacker attacks

Fears the government in a number of countries over hacker attacks that would cripple critical infrastructure occurred in December 2015, when a further constant threat (advanced persistent threat, APT) attacks on the government of Ukraine.

Worst hacker attacks

The incident became the first cyber intrusion drop and turn off the power of a nation.

Using BlackEnergy malware, hackers remotely disconnect the power 225,000 users and flooded customer service with numerous phone calls to prevent the original customer calls.

In 2015 alone, the government of the United States, the Netherlands, Ireland, and Turkey became prey to DDoS attacks, which intends to create chaos and disrupt operations.

In January 2015 in Thailand, some demonstrators angry about the government’s court verdict and launch malicious attacks against 300 government websites.

In the same month, hackers affiliated with Anonymous also initiated a similar attack against the government of Saudi Arabia and Nigeria.

Web applications and virtual DDoS violations that exploit vulnerabilities in the public sector has become more frequent and damaging.

Global risk consultancy Control Risks (Control Risks Global Risk Consulting) in the map for 2016. The annual risk report said a third of the 36 percent of cyber attacks now targeting the government sector.

DDoS attacks are becoming a weapon of destruction to digital extortionists and terrorists. DDoS attacks come in different forms.

Some of them are intended to disrupt the system, while others flood the system with requests for multiple resources (bandwidth, processor time, disk space, etc.).

In Asia, the faster the APT attacks. Territorial dispute between China, India and Southeast Asian countries continues to increase.

The hacker group known as APT 30 in recent years have been using modular malware to obtain sensitive data from their targets, including government classified secret network.

Some cyber attacks consist of emails written in the language of the recipient containing documents looks legal, but contain malware.

The attackers also made Encryption worm-like, which is attached to the hardware, such as USB thumb drives and hard disks. Once these components are in contact with other systems, such attacks would spread.

Protection against DDoS and risk APT

Derek Manky, Global Security Strategist of Fortinet said a comprehensive approach and multi-layered is one of the best ways to improve the defense of cyber threats.

Effective defense is often found when building a cohesive framework of protection and additional protection.

This framework, he added, is very important because it combines the capabilities of today’s security – technology that began to emerge and have a learning mechanism – creating a follow-up of security intelligence of the new threats detected.

Other measures include the environmental aspects of the network and devise response plans. It’s important to secure the potential narrowing, network monitoring, and make sure they go beyond major attacks and mitigation plan.

It aims to complete removal of all DDoS traffic, the strategy should seek to maintain services – especially essential services – with little disruption.

Detailed plans should include backup and recovery, additional oversight, as well as ways to restore service as quickly and efficiently as possible.

A multi-layer strategy for DDoS protection also involves a dedicated on-premise solutions that are designed to maintain and reduce the threat from all corners of the network.

“IT administrators need to remember that it is not necessary for every employee to have access to certain resources that may contain sensitive data. By limiting access whenever possible, the organization can reduce a lot of attacks,” he added.

Governments need to carefully

A strong partnership with the service provider of security, said Manky also important. Partners can provide information up-to-date and threat intelligence to the IT staff, and determine when an incident reporting channel is detected.

The government agency also should partner proactive cyber security organizations and solution providers to share threat information, so that collectively, the industry can have a more comprehensive view of the global cyber threat landscape and respond better to attack.

Lastly, although the assessment and comprehensive plan can be developed, educate government officials on cyber threats is very important.

Employees with access to sensitive information should be specially trained to know how to handle such data. For example, limiting employee access to the USB drive is a good option to protect the network.

Because, APTs, worm outbreaks, DDoS, botnets, or inbound and outbound attacks today are more sophisticated and intrusive.

“Governments need to carefully consider their security posture, proactive and adopt a multi-layered approach to minimize the risks they face,” Manky lid.