Malware Tardigrade targets biotechnology companies

B2B Cyber ​​Security ShortNews

Share post

Polymorphic malware starts data theft after ransomware attack. Malware Tardigrade is increasingly targeting biotechnology companies.

Biotech companies should review their manufacturing networks, many of which are used to manufacture critical drugs or vaccines, for signs of a newly discovered, sophisticated intellectual property theft attack. According to the Bioeconomy Information Sharing and Analysis Center (BIO-ISAC), attacks known as tardigrades are currently spreading within the industry. The malware is highly configurable, adapts to the environment it infected, and can act autonomously if cut off by the attacker's command and control server.

Malware Tardigrade is highly configurable

BIO-ISAC member BioBright investigated attacks on two systems in spring and October. Both initially reported ransomware attacks on their respective networks. This is an unusual practice given the noisy nature of ransomware attacks, which contrasts sharply with the malware's inherent stealth. BIO-ISAC released some technical details this week indicating that the attacks are ongoing. This is why biotechnology companies in particular are called upon to be particularly vigilant.

Biotechnology companies have to be careful

“This attack shows the creativity and the enormous efforts of attackers to attack industrial targets in several ways: On the one hand with a destructive element in the form of ransomware attacks, on the other hand with a cleverly camouflaged attack to steal intellectual property such as research results and production secrets “, Explains Max Rahner, Sales Director DACH of the industrial cybersecurity specialist Claroty. “Fortunately, awareness of industrial cybersecurity in biotechnology is relatively high, not least because of numerous compliance requirements. And yet the attackers were successful. It is to be feared that other industries will also be attacked in a similar way, in which the level of security and transparency in their own systems is not yet so pronounced - with potentially serious consequences. "

More at Claroty.com

 


About Claroty

Claroty, the Industrial Cybersecurity Company, helps its global customers discover, protect and manage their OT, IoT and IIoT assets. The company's comprehensive platform can be seamlessly integrated into customers' existing infrastructure and processes and offers a wide range of industrial cybersecurity controls for transparency, threat detection, risk and vulnerability management and secure remote access - with significantly reduced total cost of ownership.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more