Tuesday , October 26 2021

hackers attack the supply of vaccines


Since March, hackers have stepped up attacks on hospitals, laboratories and now the cold chain of vaccines against Covid-19 is under attack. To break into the computer systems of global organizations and corporations, hackers launched a phishing attack posing as the CEO of Haier Biomedical, a provider of vaccine storage solutions.

You will also be interested

[EN VIDÉO] Coronavirus: Official WHO shows optimism about vaccines
Several anti-covidine vaccines are in the final stages of clinical trials and may be administered at the end of the year. But before the majority of people are vaccinated, we will have to keep living with the virus.

While a few vaccines are in the process of being sold and this, in December in the UK, IBM noticed that the activity of hackers has increased, and after attacking hospitals and laboratories, they decided to disrupt the supply chain.

Set at the beginning of pandemic, working group ofIBM Security X-Force continuously monitors cyber threats related to Covid-19 against the organizations behind the vaccine supply chain, and this week these researchers unveiled a global phishing campaign targeting organizations related to the COVID-19 cold chain vaccine.

This sophisticated operation began in September 2020; has spread to six countries and targeted organizations probably related to Gavi, the CCEOP program (Cold chain equipment optimization platform) of the Vaccine Alliance. CEOs and global organizations that have sensitive and confidential information are targeted.

The hacker introduces himself as the CEO of Haier Biomedical

Initially, the pirate posed as the leader of Haier biomedical, a benchmark company in the Covid-19 vaccine supply chain and an official supplier for the CCEOP program. In his message, the hacker explained that his company is the only global supplier of cold chain, and the goal will be to gather credentials, possibly gain unauthorized access to corporate networks and sensitive information regarding the distribution of the Covid-19 vaccine.

To deceive executives and employees, e-mail seems to be a bid for vaccine delivery program. Inside an email, an attachment that opens on a computer forces recipients to enter their credentials to view the file. This phishing technique allows hackers to avoid setting up phishing web pages that can be detected and deleted by security investigation teams and law enforcement. In this attack, everything happens on the remote computer.

State hackers?

They are currently targeting companies and organizations based in Germany, Italy, South Korea, the Czech Republic and Taiwan and other unspecified European countries. Even the European Commission’s Directorate-General for Taxation and Customs Union is among the targets of hackers.

IBM has no formal evidence as to who is behind these attacks, but the company is country-oriented, and we obviously mean Russia, China and North Korea. ” The precision of the goals and the nature of the targeted organizations potentially indicate the activity of a country », IBM writes in its report. For these researchers, independent cybercriminals are unlikely to devote as much time and resources to launching such a large-scale operation with so many interconnected and distributed targets around the world.

Are you interested in what you just read?

Source link