Breaking News: “It’s a Very Large-Scale Espionage Operation”

Blog Breaking News: “It’s a Very Large-Scale Espionage Operation”

April 4, 2017 Category: Breaking News, Threats By: Jennifer Carole Comments: 0

Breaking News: “It’s a Very Large-Scale Espionage Operation”

  • A complex cybercrime spy ring has been revealed today.
  • A China-based cyber gang is behind the effort.
  • Countries targeted include Japan, UK, France and the United States.

If you’re responsible for your company’s cyber security, chances are, someone in your office has probably already forwarded this story to you. The Telegraph is sharing a story today about a Chinese-based crime ring that has been targeting businesses for years now with a sophisticated malware and phishing strategy that is helping them successfully break into networks.

The attacks were found to have breached a wide variety of secret data ranging from personal data to intellectual property, in what the report described as “one of the largest ever sustained global cyber espionage campaigns”. (more)

Around here, you’ll hear our engineers repeat the mantra, “you will get owned, it’s just a matter of time” and then they get back to work on our security solution that prevents this kind of intrusion. While next gen anti-virus does a good job, it doesn’t stop zero-day threats or malware that morphs in real time – which is the best way for the bad guys to get past your defenses.

“We’ve seen a number of different companies targeted for different reasons, but essentially it’s all around sensitive information they hold, whether that’s intellectual property, or personal information on people or a whole realm of other areas. (more)

Recently, the United States National Security Agency has recommend application isolation (note: ironically their site has a certificate issue, click through to see the content) as one way to stop cybercrime: specifically zero-days and malware. By running applications (file downloads and browsing) in micro-virtual machines, if your company is targeted the threat is contained. You can choose to let it run and learn more about the exploit, or you can simply close the micro-VM and shut it down. Even computers that aren’t running Bromium can be informed by the attack via the Sensor Network that alerts all computers there’s an attack in play.

Chances are you’ve heard about virtualization-based security. Isn’t it time you gave it a try? Start the conversation – we have a money-back guaranteed Endpoint Security Risk Assessment that is a great place to start. Or we can start with a demo. Either way, don’t let the bad guys win. Protect what’s yours and then relax when those emails start coming in.

Subscribe

Enter your email address to receive notifications.

About the Author

Jennifer Carole

Recent Posts

Categories
2017-04-04T11:29:16+00:00April 4th, 2017|Breaking News, Threats|

Leave a Reply

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.
Share
Tweet
Share

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close