Ransomware food supply giant hits JBS a and refers to Dyer threat

Barrier power Of ransomware Last month was already on full display, thanks Colon colonial pipeline Attacks that stopped the delivery of fuel from a key pipeline on the east coast of the United States for several days. Now, a different attack over the weekend is threatening the food supply chain – and again underscoring that ransom is an urgent national and international security issue.

JBS SA is the world’s largest meat processing company, headquartered in Brazil and employed over two and a half million people. Worldwide. In this Monday statementIts American subsidiary, JBS USA, said “it was the target of an organized cybersecurity attack, affecting some of the servers that supported North American and Australian IT systems.” The company added that its system backup is intact. In response to the attack, JBS USA took the affected systems offline, notified law enforcement and began working with outside incident response agencies on remedies. JBS facilities in Australia, the United States and Canada have been disrupted since Sunday’s attack was first detected.

The JBS phenomenon is now spreading in the meat industry, resulting in some plants being shut down, workers being sent home, and livestock being sent back to farmers after transportation for slaughter. The situation in Australia is particularly notable Impact on local supply chainsOfficials, however, say the measures could be in place if JBS is able to resume operations quickly.

“JBS is working closely with law enforcement agencies abroad and abroad to bring those responsible back to account,” said David Littleproud, Australia’s Minister for Agriculture, Drought and Emergency Management. Tweeted On tuesday.

JBS itself has not yet publicly called the incident a ransom attack, but White House Chief Deputy Press Secretary Carin Jean-Pierre told Air Force One. Summary On Tuesday, the agency warned the Biden administration of a ransom attack on Sunday. She Added It was carried out by a “probably Russia-based criminal organization”.

“The White House is directly involved with the Russian government in this matter and is sending the message that the responsible states do not harbor ransom criminals,” Jean-Pierre Told reporters.

Multiple U.S. presidential administrations now Shake How to make meaningful prevention against foreign hacking. Ransomware attacks are common, financially motivated and carried out by criminal hackers, not clearly state-sponsored actors. When foreign countries do not prosecute criminals or cooperate in international investigations, they land in a geopolitical gray area.

“The risk of everything from national security to food security to the healthcare system – it should be considered the ultimate global security issue,” said Brett Collo, a threat analyst at antivirus firm MSSoft. “And the transceiver has been tracked for years.”

Ransomware has become a known and active threat, especially for critical infrastructure Healthcare, Now for years, and the situation Significantly increased The Covid-19 epidemic has sparked outrage, including a recent attempt by U.S. government authorities to address it. Join a public-private task force In December. The task force released a number of recommendations at the end of April.

Researchers and respondents insisted that practical steps were needed, but that the most effective step would be to cut off all payments to ransomware actors so that they would have no incentive to continue. It is difficult to continue practicing.

Jack Williams, a former NSA hacker and founder of security firm Rendition Infosec, said, “It’s about paying – the second time it stops being profitable,” it shuts down. “You can’t make payments illegal, it will put business operators in a bad position. What law enforcement needs to do is aggressively analyze tools such as cryptocurrency exchanges and mixers so that hackers cannot cover their tracks and convert ransom payments into fiat currency. ”

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *