Tuesday, November 12, 2024
HomeSecurity NewsNorth Korean Hackers Threaten to Attack Irish companies with 'almost daily' Attacks

North Korean Hackers Threaten to Attack Irish companies with ‘almost daily’ Attacks

Published on

Malware protection

State-Sponsored Hackers from North Korea targeting Irish companies, banks, and utilities almost every day.They are likewise suspected to be in charge of the €4.3m cyber heist on Meath County Council in October 2016.

Why Ireland targeted by North Korea Hackers?

Ireland is considered as a target due to the presence of many US Multinationals, Defense Minister Paul Kehoe said we will be rapidly upgrading Ireland’s capability of defending against cyber attacks.

The cost of hacking attempts on Irish organizations has taken off from €498,000 in 2014 to €1.7m in 2016 – with examiners cautioning it is probably going to increment exponentially finished future years.

The number of cyber attacks experienced by Irish businesses increased between 2012 and 2016, but that figure is supposed to increase or even treble because of modern ransomware attacks.

- Advertisement - SIEM as a Service

Also Read Leading research and advisory firms Forrester was hacked

“There were always certain unspoken rules in terms of cyber warfare between countries and intelligence services,” Mr. Murphy said.
“But North Korea has thrown the entire rule book out the window. It is basically engaging in cyber warfare to raise funds and to cause global chaos. Reported Independent IE.

According to a nationwide cybersecurity awareness survey, over 171,000 businesses in the State could be vulnerable to crippling ransomware attacks.

Murphy said that the WannaCry ransomware assault which caused worldwide chaos not long ago was abused by North Korean leader Kim Jong-un’s cybersecurity services.

A review found that 26pc of organizations have experienced digital assaults in the previous two years, with a further 18pc uncertain in the event that they have been influenced.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...