Top IT firms under threat of cyberattack

Why is it in the news?
    • According to cybersecurity investigation website KrebsOnSecurity.com, India’s leading tech players may be under serious threat from cyber criminals.
    • The website is run by former Washington Post staffer and cybersecurity writer, Brian Krebs.
 
More in the news
    • The criminals launched phishing campaigns that netted dozens of employees and more than 100 computer systems last month at Wipro, India's third-largest IT outsourcing firm.
    • They are also appear to have targeted a number of other competing providers, including Infosys and Cognizant, as per new evidence available with the website.
    • It appears the attackers in this case are targeting companies that in one form or another have access to either a tonne of third-party company resources, and/or companies that can be abused to conduct gift card fraud.
    • It may be recalled that KrebsOnSecurity on April 15th said multiple sources were reporting a cyber security breach at Wipro, including possible cyber attacks against the company’s global customers.
    • Wipro later confirmed certain such intrusions, however said the company had taken all measures, to stop any further attacks, including hiring a forensic firm to investigate cyber attacks on its employee emails and systems.
What do you understand by Cyberattack?
    • A cyberattack is deliberate exploitation of computer systems, technology-dependent enterprises and networks.
    • Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.
    • Cyberattacks may include the following consequences:
      (1) Identity theft, fraud, extortion
      (2) Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses
      (3) Stolen hardware, such as laptops or mobile devices
      (4) Denial-of-service and distributed denial-of-service attacks
      (5) Breach of access
      (6) Password sniffing
      (7) System infiltration
      (8) Website defacement
      (9) Private and public Web browser exploits
      (10) Instant messaging abuse
      (11) Intellectual property (IP) theft or unauthorized access
    Source
    The Hindu.




    Posted by Jawwad Kazi on 20th Apr 2019