Separator

Greek Firms Check IT Systems as Iran Conflict Spikes Cyberattack Risk

Separator

image

According to reports, Greek shipowners and various firms are examining their computer systems for signs of cyberattacks following guidance from the National Cybersecurity Authority.

Last week, the authority issued a notice, accessed by Reuters, directed at security personnel from shipping firms, banks, and companies in transport, telecommunications, health, and energy sectors, according to a source within the authority, noting that the action was precautionary.

On March 11, a hacking group associated with Iran took responsibility for a cyberattack on the U.S. medical device and services provider Stryker, as stated in messages shared on the group's Telegram channel.

Albania has confirmed a cyberattack on its parliamentary digital infrastructure last week, which local media reported was carried out by the Iran-linked group known as "Homeland Justice."

The Greek advisory, categorized as "high-priority," recommended that companies conduct scans and notify security officials of a verified incident involving a "large international organisation" overseas.

Also Read: A Brief History of India's Transformation Under PM Narendra Modi

It didn't specify it. It identified signs of potential compromise, including IP addresses, tools, and malware like the VShell Remote Access Trojan.

Also Read: 5 Latest CHRO Appointments in Global Corporations

Individuals discovering signs of an attack must promptly examine their systems and restrict those IP addresses.

A minimum of two shipping firms have been alerted. In recent days, electronic disruptions to commercial vessel navigation systems have increased around the Strait of Hormuz and the broader Gulf.

 

Also Read: How This Techie Turned Visa Struggles into Startup Success

The Greek advisory indicated that an inquiry into the confirmed incident revealed an unknown, advanced threat actor employing dual layers of infrastructure to monitor activities, attempt unauthorized access, host malware, or execute command-and-control operations while evading detection.

In Print




Most Viewed

From 'Volume' to 'Value': India Inc's Mantra to Capture the Global Pharmaceutical Market A Fight Back from Arabian Peninsula When will The Tech Industry’s Lay-off Season End? The Story of a Broken Trust Technology Key To Global Travel Recovery What To Keep In Mind When Selecting The Right Air Compressor For Replacement? The Best Way to Recover from Ransomware Attacks How Tensions Grew Worse between Elon Musk and Donald Trump New Markets, New Brands: Tailoring Success for Different Places Empowered Leadership in a Changing Legal World Four Key Steps For Healthcare Providers To Combat Ransomware Turning Vision into Value: How I Built Purposeful Digital Ecosystems in the UK Dave Thomas: A Role Model for Aspiring Entrepreneurs, Philanthropists Digital Analytics Products: How Organizations Choose Them Kelly Ortberg: The New Boeing CEO Who is Already on the Headlines India’s Military Alacrity for Modern Threats Reshma Saujani: Reshaping Social Attitudes Around Gender and Tech India is Manifesting Leadership in Drone Technology 5 Greatest Role Models in the Manufacturing Industry Creating a Stronger Ecosystem by Fixing the Nuts & Bolts of the Economy Microsoft for India: Making India for Future Ready India's UPI Launch in France Opens Gateway to Global Fintech Power Tim Cook Nears Retirement, Who Will Take Over Apple's Throne? Soil Based Microbial Fuel Cells Could Protect the Environment from Flammable Chemicals The mantra of Academic Collaboration Echoes on this Teachers’ Day Indian semiconductor Boom Has Abundant Room for SME-preneurs Indian Healthcare Ecosystem is Hosting a Multidimensional Paradigm Shift Being a True Republic: You Got to Love this New, Powerful India Qatar World Cup 2022 Might Be Over, But Arabian Peninsula’s Sports Dream is Just Beginning Reimagining the UK–India Partnership in a Changing Global Order These Schemes Will Facilitate Women Entrepreneurs Decarbonization & Sustainable Future: Technology & What it can Do?


🍪 Do you like Cookies?

We use cookies to ensure you get the best experience. Read more…