Skip to main content Skip to Footer

LATEST THINKING


MANAGING MALWARE

PRACTICAL STEPS TO BETTER PROTECT AGAINST THE IMPACT OF MALEVOLENT CYBER ATTACKS

OVERVIEW

Terms like malware and ransomware are becoming mainstream as the threat of cybersecurity grows. On average, organizations suffer two to three focused attacks that breach security each month—attacks they confirmed could take months or even years to detect. Accenture Security is monitoring existing and potential threats and offering deep experience to help organizations build resilience from the inside out. Find out more about the latest malware and ransomware attacks.

MALWARE CRASHOVERRIDE/INDUSTROYER: WHAT’S THE STORY?

Security experts and market commentators alike are voicing their concerns after examination of a power outage in Ukraine’s capital, Kiev, in December 2016 identified a malware framework known as CRASHOVERRIDE or INDUSTROYER. The malware targeted Kiev’s electrical infrastructure via its Industrial Control Systems (ICS) in an unprecedented and sophisticated cyber-attack. The event has serious implications globally and could prove to be a hacker’s paradise for more than power grids in the near future.

Download our special report for practical steps organizations can take to better protect themselves from future malware attacks like CRASHOVERRIDE/INDUSTROYER.


DOWNLOAD REPORT [PDF]

WHAT DOES IT MEAN?

Alongside the use of digital technologies for enhanced automation greatly increasing hackers’ potential attack surface, aging critical infrastructure support has not always been architected with cybersecurity top of mind. CRASHOVERRIDE/INDUSTROYER targeted circuit breakers and switches hijacking electrical systems from a distance by taking advantage of standard device-level communication protocols, making it almost completely undetectable in the power infrastructure.

CRASHOVERRIDE/INDUSTROYER could be a blueprint for a more widespread and longer-lasting attack. The potential to disrupt energy, water supplies and other critical industries using ICS for automation, in an economic context, could be highly damaging to a company, municipality or nation for a long period of time.

WHY THE NAME?

The malware identifies itself as "crash," hence the choice of the term CRASHOVERRIDE/INDUSTROYER. Whoever developed the malware may have been paying homage to, or making fun of, a previously known hacker who used the name "Cr4sh".

WHAT CAN YOU DO?

Download the report and take practical steps today to protect your organization from future malware attacks like CRASHOVERRIDE/INDUSTROYER.

  1. Assess and isolate

  2. Monitor and detect

  3. Plan and prepare

  4. Mitigate risk

RANSOMWARE WANACRYPT0R: WHAT’S THE STORY?

Ransomware, also known as cryptoware, attacks a company’s data by encrypting it until a ransom is paid—with no guarantees that the data will be decrypted once the payment has been made to the adversary. Threat intelligence and law enforcement agencies warn such attacks are accelerating in frequency and targeting more businesses with increasing ransom demands.

Watch the video and download our special report for practical steps organizations can take to better protect themselves from future ransomware attacks like WanaCrypt0r.



WHAT CAN YOU DO?

Find out how you can protect your organization against ransomware attacks like WanaCrypt0r. Watch our distinguished panel of security specialists discuss the latest ransomware attack for:

  1. In-depth analysis and remediation of the current WanaCrypt0r/WannaCry attack to prepare organizations for new variants

  2. Practical advice on steps organizations can take to better protect themselves from future ransomware attacks

CONNECT WITH US








FOLLOW ACCENTURE ON:

Accenture Security on Twitter. This opens a new window Accenture Security on LinkedIn. This opens a new window.
Accenture Security on Youtube. This opens a new window. Accenture Security on Periscope. This opens a new window.
Accenture Security Blog.