POWER MAGAZINE
Written by: Steve Seiden, Leighton Johnson, Djenana Campara, Dr. Tony Barber
How do you protect yourselves from cybercriminals that plan to hold your organization for ransom? These criminals are intelligent, extremely computer literate, and know that production facilities, the utility sector, and mainly the power sector are ripe for ransom threats.
If we unpack what happened to Colonial Pipeline Co., we can identify two distinct attacks: credential stuffing (leaked VPN credentials) and ransomware. The second attack would not happen without the success of the first one. The first attack is very much connected to internal threats. There is no doubt that internal threats are of significant benefit to the hackers, making their life easier to gain access to organizations. But how do we identify internal threats?