
Top IT firms under threat of cyberattack
Why is it in the news?
- According to cybersecurity investigation website KrebsOnSecurity.com, India’s leading tech players may be under serious threat from cyber criminals.
- The website is run by former Washington Post staffer and cybersecurity writer, Brian Krebs.
More in the news
- The criminals launched phishing campaigns that netted dozens of employees and more than 100 computer systems last month at Wipro, India's third-largest IT outsourcing firm.
- They are also appear to have targeted a number of other competing providers, including Infosys and Cognizant, as per new evidence available with the website.
- It appears the attackers in this case are targeting companies that in one form or another have access to either a tonne of third-party company resources, and/or companies that can be abused to conduct gift card fraud.
- It may be recalled that KrebsOnSecurity on April 15th said multiple sources were reporting a cyber security breach at Wipro, including possible cyber attacks against the company’s global customers.
- Wipro later confirmed certain such intrusions, however said the company had taken all measures, to stop any further attacks, including hiring a forensic firm to investigate cyber attacks on its employee emails and systems.
What do you understand by Cyberattack?
- A cyberattack is deliberate exploitation of computer systems, technology-dependent enterprises and networks.
- Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.
- Cyberattacks may include the following consequences:(1) Identity theft, fraud, extortion(2) Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses(3) Stolen hardware, such as laptops or mobile devices(4) Denial-of-service and distributed denial-of-service attacks(5) Breach of access(6) Password sniffing(7) System infiltration(8) Website defacement(9) Private and public Web browser exploits(10) Instant messaging abuse(11) Intellectual property (IP) theft or unauthorized access
Source
The Hindu.