Pressemitteilungen
>
Global cyberwar: Endpoints serve as gateways for hackers

Global cyberwar: Endpoints serve as gateways for hackers

Global cyberwar: Endpoints serve as gateways for hackers
Sara Fortmann
Sara Fortmann
Senior Marketing Manager
Inhaltsverzeichniss

SIND SIE BEREIT, IHR RISIKOMANAGEMENT ZU VERBESSERN?

Machen Sie Cybersicherheit und Compliance mit ONEKEY effizient und effektiv.

Eine Demo buchen








. His team has developed the largest European platform for automated security checks of firmware on the Internet of Things. The scans detected by NATO, which point to hackers, include every gateway into an infrastructure to harm businesses, government agencies and institutions. Network building blocks such as routers, IP cameras, IP phones, system controllers, industrial production equipment, and smart buildings often serve as entry points.

Critical infrastructures particularly affected - IoT Inspector offers free security checks


IoT Inspector's automated process allows for automated device firmware checks within minutes. Following warnings from the BSI and other international security authorities, IoT Inspector offers critical infrastructures a free security check to identify potentially dangerous IoT endpoints in just a few minutes. This allows for quick decision-making on whether to update or disconnect the devices from the network.
to take advantage of this first aid quickly and without red tape.

Device manufacturers are also encouraged to close security gaps and fix them via firmware updates. Tests conducted in IoT Inspector's lab found dangerous potential for successful hacking attacks in nearly every device. The danger here is greater than ever: the day before the Russian invasion of Ukraine, numerous distributed denial of service attacks, or DDoS, were recorded against Ukrainian critical infrastructure. As with previous DDoS attacks, so-called wipers were also found on Ukrainian computers. These programs are designed to delete data and render computers unusable - a typical weapon in cyberwar.

Scanning activity must be taken seriously


The aggressive scanning activity increasingly detected in networks around the globe in recent days is seen by the BSI as possible preparatory actions for later attacks. "The activities must be taken very seriously, and measures to counter them must be taken as quickly as possible," says Jan Wendenburg of IoT Inspector. According to the BSI, however, collateral damage outside of Ukraine could not be ruled out, and the agency considered possible scenarios to include computer worms such as WannaCry and NotPetya, or targeted attacks on supply chains to attack basic services as well as energy, water, and medical facilities. A quick response is therefore necessary, according to IT experts at BSI and IoT Inspector. The faster risks are checked, the faster dangerous security gaps can be closed by manufacturers, IT departments and authorities.

Teilen

Über Onekey

EIN SCHLÜSSEL ist der führende europäische Spezialist für Product Cybersecurity & Compliance Management und Teil des Anlageportfolios von PricewaterhouseCoopers Deutschland (PwC). Die einzigartige Kombination aus einer automatisierten Product Cybersecurity & Compliance Platform (PCCP) mit Expertenwissen und Beratungsdiensten bietet schnelle und umfassende Analyse-, Support- und Verwaltungsfunktionen zur Verbesserung der Produktsicherheit und -konformität — vom Kauf über das Design, die Entwicklung, die Produktion bis hin zum Ende des Produktlebenszyklus.

onekey team

KONTAKT:
Sarah Fortmann

Leiter Marketing
sara.fortmann@onekey.com

euromarcom public relations GmbH
+49 611 973 150
team@euromarcom.de

Bereit zur automatisierung ihrer Cybersicherheit & Compliance?

Machen Sie Cybersicherheit und Compliance mit ONEKEY effizient und effektiv.