Breaking News: “It’s a Very Large-Scale Espionage Operation”

Author: No Comments Share:
  • A complex cybercrime spy ring has been revealed today.
  • A China-based cyber gang is behind the effort.
  • Countries targeted include Japan, UK, France and the United States.

If you’re responsible for your company’s cyber security, chances are, someone in your office has probably already forwarded this story to you. The Telegraph is sharing a story today about a Chinese-based crime ring that has been targeting businesses for years now with a sophisticated malware and phishing strategy that is helping them successfully break into networks.

The attacks were found to have breached a wide variety of secret data ranging from personal data to intellectual property, in what the report described as “one of the largest ever sustained global cyber espionage campaigns”. (more)

Around here, you’ll hear our engineers repeat the mantra, “you will get owned, it’s just a matter of time” and then they get back to work on our security solution that prevents this kind of intrusion. While next gen anti-virus does a good job, it doesn’t stop zero-day threats or malware that morphs in real time – which is the best way for the bad guys to get past your defenses.

“We’ve seen a number of different companies targeted for different reasons, but essentially it’s all around sensitive information they hold, whether that’s intellectual property, or personal information on people or a whole realm of other areas. (more)

Recently, the United States National Security Agency has recommend application isolation (note: ironically their site has a certificate issue, click through to see the content) as one way to stop cybercrime: specifically zero-days and malware. By running applications (file downloads and browsing) in micro-virtual machines, if your company is targeted the threat is contained. You can choose to let it run and learn more about the exploit, or you can simply close the micro-VM and shut it down. Even computers that aren’t running Bromium can be informed by the attack via the Sensor Network that alerts all computers there’s an attack in play.

Chances are you’ve heard about virtualization-based security. Isn’t it time you gave it a try? Start the conversation – we have a money-back guaranteed Endpoint Security Risk Assessment that is a great place to start. Or we can start with a demo. Either way, don’t let the bad guys win. Protect what’s yours and then relax when those emails start coming in.

Previous Article

Why Bromium Is Not Just Protection, But Also An Enhanced Predictive Analytics Solution

Next Article

Did You Have Ransomware Served to You Via Skype?

You may also like