Write For Us
Why Fluper

CALL US NOW

+91-959-955-1432

+971-54-700-4175

Build, Launch, & Grow with Fluper!

We Are All-in-One App Development Partner for you with the phenomenon to build outstanding solutions!

View Portfolio

In the last five years, ransomware has become the worst threat to factories, hospitals and local towns and school districts have been shut down all over the world. Researchers have found ransomware to do something potentially more sinister in recent times, deliberately manipulate control systems, which rely on dams, gas and electrical grids refineries to ensure that equipment runs safely.

Also Read: Podcast App Overcast Introduces Automated Speech Enhancement and Intro Skipping

Ransomware has always been a threat to security. Yet disruption to IT infrastructure inside targeted networks remained controlled. Unless the Ransomware jumps into ICS networks–usually segregated and strengthened.

CTA

The study of Monday identified Ekans’s ICS as minimal and honest because the malware literally destroys different processes generated by ICS systems that are widely-used. This is a key differentiator in ICS targeting ransomware that has been uncovered in recent years before doing much more severe damage.

Ransomware Not Only Encrypts Data

Industroyer, Trisis and the others provided code which controlled, mapped or dismantling certain sensitive functions in the critical infrastructure sites they attacked, surgically and painstakingly. In comparison, Ekans and Mega Cortex simply eliminate ICS software-generated systems. The consequence of the protection of activities inside contaminated systems would be just what the killing of those processes would have.

Another explanation of why Dragos thinks Ekans is a “relatively primitive attack” is that there is no method for distributing ransomware. It makes Ekans much less of a threat than Ransomware like Ryuk, who gathers passwords on compromised devices secretly for months so that they can proliferate freely in most areas of a targeted network.

The recent report on Ekans, also named Snake, which was modeled by Iran. Based on the findings of the security firm Otorio, the study reported parallels with previously known Iranian malware and operations. Researchers from Dragos said the company “founds that such a link on the basis of evidence is incredibly tenuous.”

Ekans deserves serious attention from organizations that carry out ICS operations in spite of the lack of sophistication and established linkages with national States.

Disclaimer

CTA

Akansha Pandey
Author

Akanksha- Revenue Generation and Sales /App promotion Being in the position of VP in Sales at Fluper, Ms. Akansha Pandey has already worked with several clients internationally. She has her core expertise in Revenue Generation, Sales, and App Promotion. Having previous years of experience, Ms. Akansha has accomplished itself as an effective communicator and resilient motivator with a dedication for persistent innovation and improvement.

Write A Comment