![]() ![]() Over the course of the next seven months, he tried to reach the city’s chief information officer, the Illinois governor’s office, and the Department of Homeland Security.Īs he waited for someone to take notice of his missives, Cable started to wonder whether the rest of America’s electoral infrastructure was as weak as Chicago’s. He began sending urgent warnings about the problem to every official email address he could find. Despite his technical savvy, Cable was at a loss for how to alert the authorities. It suggested that the site was vulnerable to those with less beneficent intentions than his own, that they could read and perhaps even alter databases listing the names and addresses of voters in the country’s third-largest city. Though it wouldn’t have given the average citizen a moment of pause, Cable recognized the error message on the Chicago Board of Elections website as a telltale sign of a gaping hole in its security. He collected enough cash prizes from the bug bounties to cover the costs of four years at Stanford. Cable, who is preternaturally persistent, had a knack for finding these soft spots. The fact that a single keystroke had short-circuited his registration filled Cable with a sense of dread.ĭespite his youth, Cable already enjoyed a global reputation as a gifted hacker-or, as he is prone to clarify, an “ethical hacker.” As a sophomore in high school, he had started participating in “bug bounties,” contests in which companies such as Google and Uber publicly invite attacks on their digital infrastructure so that they can identify and patch vulnerabilities before malicious actors can exploit them. Clicking back to his initial entry, he realized that he had accidentally typed an extraneous quotation mark into his home address. When Cable tried to complete the digital forms, an error message stared at him from his browser. The solution to the ransomware issue will still leave us unprotected, ”the specialist wrote.Ĭable agreed in response that the ransomware viruses were just a "symptom." In his opinion, it is necessary to "raise the bar for security at the national level," without giving up the economic pressure on the operators of such software.To hear more feature stories, get the Audm iPhone app. “Policymakers should focus on cybersecurity as a whole, and not just discuss the visible aspects of disruptions. Trending: Bitcoin whale reserves fall to a three-year low ![]() Jake Williams, CTO of BreachQuest, noted that the United States has no difficulty with ransomware - the problem lies in the weak information security infrastructure. US President Joe Biden considered tracing cryptocurrency transactions to be one of the possible options for combating ransomware viruses. The total damage could more than double if the REvil group receives the $ 70 million they demanded from victims in early July. In second place is Netwalker (Mailto), whose developers and affiliates received more than $ 5.7 million. Its victims paid more than $ 11.3 million. Trending: Chinese customs detain 49 smuggling Bitcoin minersĪccording to the service, in 2021, REvil (Sodinokibi) from the hacker group of the same name became the largest ransomware. He explained that the presence of such information is going to allow us to understand whether certain actions change the state of affairs for the better. The project team expects Ransomwhere to help assess the spread of malware and develop effective measures to combat it.Īccording to Cable, it is impossible to analyze the consequences of ransomware attacks without comprehensive public data on the total number of payments in their favor. The tool tracks payments to ransomware by collecting information about attacks from affected users and verifying the authenticity of these messages. The service was launched by Jack Cable, an engineer at the cybersecurity-focused company Krebs Stamos Group. In 2021, ransomware-related addresses received over $ 33 million in cryptocurrency.
0 Comments
Leave a Reply. |