By Lesley Sabas
A sequence of attacks against websites for US airports on October 10 has been attributed to the pro-Russian hacking group Killnet. The Los Angeles International Airport (LAX), Chicago O’Hare (ORD), and Atlanta Hartsfield-Jackson International airport websites were among those impacted. Although the attacks temporarily brought websites offline, it seems like airport operations were unaffected. Yet, these attacks raise doubts about the development of cyber risks to vital infrastructure and the rationale behind them.
Cyberattacks and other Internet issues frequently target airports and airlines around the world. Their weaknesses are the enormous financial costs of disrupting air travel and the inconvenience that can be inflicted on a large number of consumers in a limited amount of time.
Thousands of customers who sought to use British Airways’ site in 2018 were somehow routed to a counterfeit one, leading to significant data theft.
Britain and the European Union stated in May that Russia was directly to blame for massive data theft on a satellite Internet network that knocked thousands of modems offline.
In recent months, Killnet has been one of the more active pro-Russian cyber threat organizations. Killnet has been consistently publishing purported evidence of attacks against organizations in NATO member states and those it claims to believe are continuing to support Ukraine in the conflict almost since the start of Russia’s invasion of Ukraine.
The most recent attacks by Killnet provide a chance to assess the cybersecurity of critical infrastructure and make plans for potentially more harmful attacks that might cause significant service interruptions affecting vital services like control, fuel, supply chains, and healthcare.
Fortunately, there is a solution to attempt to fix this issue but before going forward, it is essential to know that in order to stay protected, you have to have an efficient form of security.
Israeli Cybersecurity company, Astrix Security, makes sure core systems are securely connected to outside cloud services. Cookies are used on this website to enhance user experience.
Astrix protects core systems across SaaS, PaaS, and IaaS from over-privileged, unnecessary, and malicious integrations that expose organizations to supply chain attacks, data leakage, and compliance violations, from Salesforce and Office 365 to GitHub, Snowflake, and Workato. All of your company’s third-party connections can be found in one intuitive place thanks to continuous exposure identification and special in-depth contextual analysis. The only logic engine specifically designed for the challenges of third-party integration will help it detect threats to external connections, improper integration, and anomalies. With the only logic engine purpose-built for the complexities of third-party integration, it will also detect external connection threats, integration misuse, and oddities. Astrix utilizes contextual and implementable mitigations to address emerging threats and decrease the attack surface. With out-of-the-box and zero-trust security controls, the system automatically gains control over all app-layer access, sets enforcement guardrails, and prevents policy drifts.
Write to Lesley Sabas at lsabasruano@scu.edu