Thông tin về công ty

Sản phẩm

Thông tin

Hỗ trợ chung


Title Date
Cyberattack (Petya Ransomware) Hits Ukraine Then Spreads Internationally, Similar to WannaCry
28hack1-master768.jpg ▲ Several companies have been affected by the Petya cyberattack, including, from left, Rosneft, the Russian energy giant; Merck, a pharmaceutical company; and Maersk, a shipping company. Left, Sergei Karpukhin/Reuters; center, Matt Rourke/Associated Press; right, Enrique Castro Sanchez/Agence France-Presse — Getty Images Computer systems from Ukraine to the United States were struck on Tuesday in an international cyberattack that was similar to a recent assault that crippled tens of thousands of machines worldwide. In Kiev, the capital of Ukraine, A.T.M.s stopped working. About 80 miles away, workers were forced to manually monitor radiation at the old Chernobyl nuclear plant when their computers failed. And tech managers at companies around the world, from Maersk, the Danish shipping conglomerate, to Merck, the drug giant in the United States, were scrambling to respond. It was unclear who was behind this cyberattack, and the extent of its impact was still hard to gauge Tuesday. It started as an attack on Ukrainian government and business computer systems — an assault that appeared to have been intended to hit the day before a holiday marking the adoption in 1996 of Ukraine’s first Constitution after its break from the Soviet Union. The attack spread from there, causing collateral damage around the world. The outbreak was the latest and perhaps the most sophisticated in a series of attacks making use of dozens of hacking tools that were stolen from the National Security Agency and leaked online in April by a group called the Shadow Brokers. Like the WannaCry attacks in May, the latest global hacking took control of computers and demanded digital ransom from their owners to regain access. The new attack used the same National Security Agency hacking tool, Eternal Blue, that was used in the WannaCry episode, as well as two other methods to promote its spread, according to researchers at the computer security company Symantec. The National Security Agency has not acknowledged its tools were used in WannaCry or other attacks. But computer security specialists are demanding that the agency help the rest of the world defend against the weapons it created. “The N.S.A. needs to take a leadership role in working closely with security and operating system platform vendors such as Apple and Microsoft to address the plague that they’ve unleashed,” said Golan Ben-Oni, the global chief information officer at IDT, a Newark-based conglomerate hit by a separate attack in April that used the agency’s hacking tools. Mr. Ben-Oni warned federal officials that more serious attacks were probably on the horizon. The vulnerability in Windows software used by Eternal Blue was patched by Microsoft in March, but as the WannaCry attacks demonstrated, hundreds of thousands of groups around the world failed to properly install the fix. “Just because you roll out a patch doesn’t mean it’ll be put in place quickly,” said Carl Herberger, vice president for security at Radware. “The more bureaucratic an organization is, the higher chance it won’t have updated its software.” Because the ransomware used at least two other ways to spread on Tuesday, even those who used the Microsoft patch could be vulnerable, according to researchers at F-Secure, a Finnish cybersecurity firm. A Microsoft spokesman said the company’s latest antivirus software should protect against the attack. The Ukrainian government said several of its ministries, local banks and metro systems had been affected. A number of other European companies, including Rosneft, the Russian energy giant; Saint-Gobain, the French construction materials company; and WPP, the British advertising agency, also said they had been targeted. Ukrainian officials pointed a finger at Russia on Tuesday, although Russian companies were also affected. Home Credit bank, one of Russia’s top 50 lenders, was paralyzed, with all of its offices closed, according to the RBC news website. The attack also affected Evraz, a steel manufacturing and mining company that employs about 80,000 people, the RBC website reported. In the United States, the multinational law firm DLA Piper also reported being hit. Hospitals in Pennsylvania were being forced to cancel operations after the attack hit computers at Heritage Valley Health Systems, a Pennsylvania health care provider, and its hospitals in Beaver and Sewickley, Penn., and satellite locations across the state. A National Security Agency spokesman referred questions about the attack to the Department of Homeland Security. “The Department of Homeland Security is monitoring reports of cyberattacks affecting multiple global entities and is coordinating with our international and domestic cyber partners,” Scott McConnell, a department spokesman, said in a statement. Computer specialists said the ransomware was very similar to a virus that emerged last year called Petya. Petya means “Little Peter,” in Russian, leading some to speculate the name referred to Sergei Prokofiev’s 1936 symphony “Peter and the Wolf,” about a boy who captures a wolf. Reports that the computer virus was a variant of Petya suggest the attackers will be hard to trace. Petya was for sale on the so-called dark web, where its creators made the ransomware available as “ransomware as a service” — a play on Silicon Valley terminology for delivering software over the internet, according to the security firm Avast Threat Labs. That means anyone could launch the ransomware with the click of a button, encrypt someone’s systems and demand a ransom to unlock it. If the victim pays, the authors of the Petya ransomware, who call themselves Janus Cybercrime Solutions, get a cut of the payment. That distribution method means that pinning down the people responsible for Tuesday’s attack could be difficult. The attack is “an improved and more lethal version of WannaCry,” said Matthieu Suiche, a security researcher who helped contain the spread of the WannaCry ransomware when he created a kill switch that stopped the attacks. In just the last seven days, Mr. Suiche noted, WannaCry had tried to hit an additional 80,000 organizations but was prevented from executing attack code because of the kill switch. Petya does not have a kill switch. 28hack2-master675.png ▲ A screenshot of what appeared to be the ransomware affecting systems worldwide on Tuesday. The Ukrainian government posted the shot to its official Facebook page. Petya also encrypts and locks entire hard drives, whereas the earlier ransomware attacks locked only individual files, said Chris Hinkley, a researcher at the security firm Armor. The hackers behind Petya demanded $300 worth of the cybercurrency Bitcoin to unlock victims’ machines. By Tuesday afternoon, online records showed that 30 victims had paid the ransom, although it was not clear whether they had regained access to their files. Other victims may be out of luck, after Posteo, the German email service provider, shut down the hackers’ email account. In Ukraine, people turned up at post offices, A.T.M.s and airports to find blank computer screens, or signs about closures. At Kiev’s central post office, a few bewildered customers milled about, holding parcels and letters, looking at a sign that said, “Closed for technical reasons.” The hackers compromised Ukrainian accounting software mandated to be used in various industries in the country, including government agencies and banks, according to researchers at Cisco Talos, the security division of the computer networking company. That allowed them to unleash their ransomware when the software, which is also used in other countries, was updated. The ransomware spread for five days across Ukraine, and around the world, before activating Tuesday evening. “If I had to guess, I would think this was done to send a political message,” said Craig Williams, the senior technical researcher at Talos. One Kiev resident, Tetiana Vasylieva, was forced to borrow money from a relative after failing to withdraw money at four automated teller machines. At one A.T.M. in Kiev belonging to the Ukrainian branch of the Austrian bank Raiffeisen, a message on the screen said the machine was not functioning. Ukraine’s Infrastructure Ministry, the postal service, the national railway company, and one of the country’s largest communications companies, Ukrtelecom, had been affected, Volodymyr Omelyan, the country’s infrastructure minister, said in a Facebook post. Officials for the metro system in Kiev said card payments could not be accepted. The national power grid company Kievenergo had to switch off all of its computers, but the situation was under control, according to the Interfax-Ukraine news agency. Metro Group, a German company that runs wholesale food stores, said its operations in Ukraine had been affected. At the Chernobyl plant, the computers affected by the attack collected data on radiation levels and were not connected to industrial systems at the site, where, although all reactors have been decommissioned, huge volumes of radioactive waste remain. Operators said radiation monitoring was being done manually. Cybersecurity researchers questioned whether collecting ransom was the true objective of the attack. “It’s entirely possible that this attack could have been a smoke screen,” said Justin Harvey, the chief security officer for the Fidelis cybersecurity company. “If you are an evildoer and you wanted to cause mayhem, why wouldn’t you try to first mask it as something else?” Nicolas Duvinage, head of the French military’s digital crime unit, told Agence France-Presse the attack was “a bit like a flu epidemic in winter”, adding: “We will get many of these viral attack waves in coming months.” The growing fight against cyber-attacks has seen protection spending surge around the world, with the global cyber security market estimated to be worth some £94bn ($120bn) this year – more than 30 times its size just over a decade ago. [By NICOLE PERLROTH, MARK SCOTT and SHEERA FRENKEL of The New York Times  |  JUNE 27, 2017]

[INTERVIEW] Q&A with security specialist company, NPCore

2016-11-30 15:04
[INTERVIEW] Q&A with security specialist company, NPCore

[인터뷰] 보안 전문 기업 ‘엔피코어’와의 일문일답

최근 APT나 랜섬웨어 등 악성코드를 이용한 신종 해킹 공격이 PC 사용자들에게 점차 확대되고 있으며, 개인 정보 유출이나 금융사기 등과 같은 피해 사례가 증가하고 있다. 이에 따라 보안 문제에 대응하는 솔루션 도입이 요구되고 있는 시점에, ‘좀비제로(Zombie ZERO)’ 솔루션으로 APT131 시장을 공략하는 기업이 있어 만나 보았다.


네트워크 및 엔드포인트 보안 전문기업 ‘엔피코어’.

다음은 엔피코어 한승철 대표와의 일문일답이다.


▲ 엔피코어의 한승철 대표(사진 제공 = 엔피코어)


Q.회사소개 부탁드립니다.

A. 엔피코어는 APT 및 랜섬웨어 공격방어 솔루션 전문기업으로 네트워크와 엔드포인트에 이중방어를 제공합니다.  안티바이러스 위주의 보안시장에서 악성코드 전문 탐지 대응 솔루션 개발을 목표로 대한민국을 대표하는 글로벌 보안 전문 기업으로 도약해 나가고자 합니다.


Q. 설립한지는 얼마나 됐나요?

A. 2008년입니다. 현재는 미국에 법인을 설립했고 베트남에 지사, 일본, 인도네시아, 대만, 말레이시아에 총판사를 통해 해외시장 영업을 진행하고 있으며, 태국, 필리핀 등 동남아와 미국 시장 진출 확대를 위해 총력을 다하고 있습니다.


Q. 현재 진행중인 서비스에 대한 소개 부탁 드립니다.

A. 좀비제로(ZombieZERO)입니다. 좀비제로는 신종 APT 공격 및 악성코드 탐지/방어 솔루션으로 최근 발생하는 랜섬웨어나 자료유출사고, 네트워크 마비 등 보안사고 발생을 미연에 방지하는 정보보안 시스템입니다. 샌드박스(Sandbox) 기반의 가상시스템을 탑재하여 가상시스템 공간 내에서 시그니쳐 분석과 행위기반 분석을 통해 알려지지 않은 신종 악성코드까지 탐지하여 보안이슈를 효율적으로 해결할 수 있는 솔루션을 제공합니다.


Q. APT가 무엇인가요?

A. APT(Advanced Persistent Threat:지능형지속위협)는 악의적인 범죄 그룹에 의해 지정된 특정대상에 대해 이메일이나 웹 등을 활용하여, 목적 달성 시까지 지속적인 공격을 수행하는 신종 해킹 기법입니다.


Q. 좀비제로가 어떻게 분석하는지에 대한 구체적인 설명 해주세요.

A. 좀비제로는 체계적인 3단계 분석을 걸칩니다. 1차적으로 수집된 파일을 유형별로 분류한 뒤, 2중 분석(네트워크 기반 분석+엔드포인트 기반 분석)을 통해 알려지지 않은 악성코드까지 탐지합니다. 또한 탐지된 악성코드 패턴 생성으로 감염 PC치료 기능까지 제공합니다. 마지막으로 가상시스템 상에서 의심파일 실행 후 모든 파일의 행위를 분석하는 동적 분석시스템과 문서의 소스코드 및 스크립트를 분석하는 정적 분석 시스템 2가지로 진행되는 행위기반 분석까지 진행합니다. 올해 초 랜섬웨어 방어 기술을 추가해 성능을 강화했습니다.

Q. 이 서비스/사업을 통해 어떠한 혜택을 제공할 예정이신가요?

A. 불법 행위를 발생시키는 프로세스와 파일을 직접 찾아 치료함으로써 신종 악성코드 및 알려지지 않은 악성코드에 대해서도 탐지/치료가 가능합니다.


Q. 기존의 서비스와 차별점이 있다면 어떤건가요?

A. 행위기반으로 악성코드를 탐지/분석/차단을 한다는 점에서 기존 안티 바이러스 소프트웨어와 차별점이 있습니다. 또한 타경쟁사의 경우 용도별 솔루션을 별도로 운영해 클라이언트는 이를 각각 구매해 운영해야 하지만 좀비제로는 솔루션 한 대로 해결 가능해 운영/관리의 효율성과 비용 절감의 경제성 측면에서 경쟁력을 갖추고 있습니다.



▲ 행위 기반의 정보 보안 솔루션 'zombieZERO'(사진 제공 = 엔피코어)


Q. 가격은 어떻게 되나요?

A. 가격부분에서는 외산 제품과 대비하여 30%정도의 가격경쟁력을 보유하고 있고, 국내 경쟁 제품과는 제품별 차이는 있으나 약 15%정도의 가격 경쟁력을 보유하고 있습니다.


Q. 엔피코어의 새로운 서비스는 무엇이 있을까요?

A. 세가지가 있는데요, 첫 번째는 하드웨어 구입 없이 서버에 바로 탑재 가능한 ‘ZombieZERO Virtual Appliance’ 입니다. 장비를 구입할 필요가 없고, 기존 보유서버를 활용하면서 APT나 랜섬웨어의 공격을 방어할 수 있습니다. 두 번째는 행위기반 분석과 실시간 백업을 하나로 하는 PC용 랜섬웨어 전용 솔루션 ‘랜섬제로’ 입니다. 마지막은 다우기술과 기술 제휴한 ‘테라스메일시큐리티’로, 이메일의 APT공격 선제 대응을 위한 통합메일보안 제품입니다.



▲ (사진 제공 = 엔피코어)


Q. 추후 목표에 대해 말씀해주십시오.

A. 해외시장을 더 적극적으로 공략해 글로벌 보안 전문기업으로 성장해 나가겠습니다. 감사합니다.

[ 출처 : 한국투데이 이은지 기자 splendent10@naver.com   2016.09.07 13:33 ]