BancoEstado, one of Chile’s three biggest banks, was forced to shut down all branches on Monday following a ransomware attack that took place over the weekend:
Our branches will not be operational and will remain closed today,” the bank said in a statement published on its Twitter account on Monday. Details about the attack have not been made public, but a source close to the investigation told ZDNet that the bank’s internal network was infected with the REvil (Sodinokibi) ransomware. The incident is currently being investigated as having originated from a malicious Office document received and opened by an employee. The malicious Office file is believed to have installed a backdoor on the bank’s network.
Well, this is an example of why you need to train people to avoid the sorts of behaviors that lead to something like this. Clicking on a boobytrapped Office document is something that should not happen if users are aware of the risks. Having said that, you have to wonder why whatever anti-malware application that this bank uses didn’t catch this as REvil isn’t new. Perhaps it’s a new variant? There are so many questions about this attack that I would like to see answered so that we can all learn from this and protect ourselves.
Like this:
Like Loading...
Related
This entry was posted on September 8, 2020 at 9:47 am and is filed under Commentary with tags Hacked. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
One Of Chile’s Biggest Banks Pwned By Ransomware
BancoEstado, one of Chile’s three biggest banks, was forced to shut down all branches on Monday following a ransomware attack that took place over the weekend:
Our branches will not be operational and will remain closed today,” the bank said in a statement published on its Twitter account on Monday. Details about the attack have not been made public, but a source close to the investigation told ZDNet that the bank’s internal network was infected with the REvil (Sodinokibi) ransomware. The incident is currently being investigated as having originated from a malicious Office document received and opened by an employee. The malicious Office file is believed to have installed a backdoor on the bank’s network.
Well, this is an example of why you need to train people to avoid the sorts of behaviors that lead to something like this. Clicking on a boobytrapped Office document is something that should not happen if users are aware of the risks. Having said that, you have to wonder why whatever anti-malware application that this bank uses didn’t catch this as REvil isn’t new. Perhaps it’s a new variant? There are so many questions about this attack that I would like to see answered so that we can all learn from this and protect ourselves.
Share this:
Like this:
Related
This entry was posted on September 8, 2020 at 9:47 am and is filed under Commentary with tags Hacked. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.