Destructive Cyber-Attacks Double In First Half Of 2019

Destructive cyber-attacks have doubled in the past six months, with half of those targeting the manufacturing sector, researchers have said.

IBM’s X-Force IRIS incident response team said that while such attacks have in the past been mainly associated with nation-states, cyber-criminals are increasingly making use of them as part of ransomware in order to increase pressure on their targets to pay ransoms.

The findings are drawn from incidents the IRIS team has helped  companies respond to.

Destructive attacks, in contrast to those aimed at stealing funds or data, rose 200 percent in the first half of 2019 compared with the second half of last year.

security, x-force, attack, cyberHigh cost of recovery

Such attacks are typically aimed at rendering systems and equipment unusable, and cost multinational companies $239 million (£196m) on average, with a single attack destroying 12,000 workstations or laptops on average.

That’s 61 times more costly than the average data breach, at $3.92m, X-Force said.

On average companies’ response teams required 512 hours to remediate destructive attacks, with the figure rising higher if firms employ more than one company to carry out remediation.

Well-known destructive attacks including Stuxnet, Shamoon and DarkSeoul are thought to have been carried out by nation-states, but X-Force said newer ransomware strains including LockerGoga and MegaCortex also include destructive “wiper” elements.

Financially motivated attackers may be adopting these destructive elements to add pressure to their victims to pay the ransom, or to lash out at victims if they feel wronged,” X-Force said in its study.

Credential risk

Aside from manufacturing, the group found that oil and gas and education were also at risk.

Most of the destructive attacks were observed in Europe, the U.S. and the Middle East, and gained initial access via phishing emails, password guessing, third-party connections and watering hole attacks.

At times attackers waited weeks or months after gaining initial access before launching an attack, IBM found.

The company advised firms to ensure they have adequate security and disaster-recovery plans in place, and recommended security measures such as multi-factor authentication.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Apple ‘Developing’ Two Vision Pro Headset Successors

Apple reportedly working on lighter, cheaper Vision Pro, another model that links directly to Mac…

21 hours ago

OpenAI Releases GPT-4.1 With Improved Coding

OpenAI says GPT-4.1 model family can understand prompts with up to 1 million tokens, features…

22 hours ago

Blue Origin Sends All-Female Crew Into Space

Blue Origin jaunt sends Jeff Bezos fiancée Lauren Sanchez into space along with Katy Perry…

22 hours ago

Meta Begins Using EU Users’ Data To Train AI

Meta to use public posts from EU users on Facebook, Instagram to train AI models…

23 hours ago

Apple Leads Smartphone Market In First Quarter

Apple tops smartphone sales worldwide in first quarter after iPhone 16e launch, in spite of…

23 hours ago

Intel Sells Majority Stake In Altera To Silver Lake

Intel sells 51 percent of programmable chip unit Altera to Silver Lake Partners in deal…

24 hours ago