The Ministry of Science and Innovation confirmed that the Spanish energy company CSIC has been affected by a Russian cyber attack on 16-17 July. Although multiple security mechanisms have been in place to protect the energy company, the attacks have left CSIC without an internet connection. Only a quarter of its centers have recovered their network connections. The Ministry of Science and Innovation has assured that the problem will be resolved in the “next few days”.
Spanish energy company CSIC has been without internet for two weeks
A recent cyber attack from Russia has left CSIC, the largest scientific body in Spain, without internet connection for two weeks. According to Spanish ministers, a ransomware-type attack destroyed the CSIC system, causing the scientific institute to cut its internet connection. It’s unclear whether sensitive information was compromised, but the company’s researchers are trying to figure out what happened.
Thousands of people have been affected by the attack, which disrupted the Spanish energy company’s data network and servers. The shutdown has cost the company thousands of euros. The company is heavily reliant on the cybersecurity infrastructure provided by its National Cryptologic Center, Cybersecurity Operations Centre, and First Vice President. The cyberattack left the company without internet connection for two weeks and is threatening the energy industry.
Spanish energy company CSIC has multiple security mechanisms that have already prevented 260,000 recorded attacks
Spain has raised its cybersecurity alert level to three after cyberattacks targeted its neighbor to the east, Ukraine. There are now many attacks on Spanish organizations and data, and the CSIC has a number of security measures in place to protect them. These include computer networks with multiple layers of security and a central cyber-defence center. The CSIC has multiple security mechanisms that have already prevented 260,000 recorded attacks.
The Cyber Security Operations Center (CSIC) in Spain is heavily reliant on the CNI and the Vice President of the government for its operations. The Chief Research Agent is inactive, and no one cares about them. CSIC has multiple security mechanisms that have already prevented 260,000 recorded attacks, but it is still not enough. The organization’s infrastructure and systems are growing increasingly interdependent, which means updated, dynamic security policies.
Ransomware attack on insurance firm CNA Financial
Recently, an insurance firm, CNA Financial Corp., was the target of a ransomware attack. Cybercriminals called themselves Phoenix raised a $40 million demand from the company, claiming to have critical data, and promising to restore the files if the company paid them. The cybercriminals threatened the firm not to speak about the attack, so the company agreed to pay them. Eventually, the cybercriminals released their data, but only after CNA paid the ransom.
The cyberattack on CNA Financial has impacted its entire network and systems. The company’s corporate email was also affected. It took swift action to investigate the incident and engage law enforcement. While CNA’s customer data was not exfiltrated, the insurance firm is working with law enforcement and third-party forensic experts to determine if the company’s systems were affected. If the company’s system and data were impacted, it’s unknown if policyholder information was compromised.
Increase in cyber attacks in Europe since the Ukraine war
The recent Russian invasion of Ukraine has presented a unique opportunity for the world to better understand the use of cyber-attacks for military purposes. By providing context to the cyberattacks and their results, the wartime crisis can help defense experts better understand Russia’s strategies. Cyber-attacks and the context surrounding them can also provide clues as to what Russia might be planning in the future. In the end, a more informed world can better protect itself from cyberattacks.
The Russian invasion of Ukraine has also increased the risk of cyber attacks targeting government agencies and businesses in Europe. With the possibility of spillover cyberattacks, issuers doing business with Ukraine and other nations are now exposed to heightened risks. Cyberattacks targeting critical infrastructure such as power plants, hospitals, and banks pose significant risks to organizations that do business with the Ukraine. And in 2017, a global cyberattack known as the NotPetya compromised computer systems worldwide and caused billions of dollars in damage.