Critical Infrastructure targeted

Critical infrastructures targeted by cyber criminals

In mid-June, the Mainz municipal utility and the Darmstadt energy supplier Entega in Germany reported a cyberattack on their systems. The attack was on the IT service provider of the energy suppliers - according to the Hessian Ministry of the Interior, the hacker attack was a ransomware attack. The ministry does not want to say how high the demanded ransom is in this case because of the ongoing investigations. And the incident has so far ended smoothly: Both the city's critical infrastructure and customer data are currently unaffected by the attack. However, there have been increased delays in bus services because not all IT systems are running properly again. Such incidents are not an isolated case. It was only in the fall of 2021 that Stadtwerke Wismar was targeted by cybercriminals. After a cyber attack, employees could no longer access company data. Although the energy supply was ensured at all times, the IT systems of the municipal utility were in emergency operation until the turn of the year.

Critical infrastructures (CRITIS), i.e. system-relevant companies and organizations, are increasingly becoming victims of hacker attacks. "Cyber attacks are almost the order of the day for CRITIS operators in all sectors," was also the verdict of the Federal Office for Information Security (BSI) in its report on the "Situation of IT Security in Germany 2021." And the BKA situation report "Cybercrime 2021" also confirms that attackers primarily targeted CRITIS and public authorities last year. The reason for this is the enormous relevance of CRITIS for the state. A successful attack can have fatal consequences for the affected organization and the civilian population. This makes them particularly vulnerable to blackmail.

Damage from ransomware on the rise

Increasingly, these attacks are ransomware attacks ¬- in which data is encrypted and often stolen, with subsequent ransom demands. The number of such extortion attacks continued to increase in 2021, according to the BKA. And the annual damage caused by ransomware has risen rapidly in recent years: from 5.3 billion euros (2019) to about 24.3 billion euros (2021). Per attack, the damage has increased by 21% on average.

At the same time, phishing is becoming more and more professionalized. Employees of a company hardly recognize such emails anymore. The fake e-mails are often used to put targeted pressure on employees by threatening them with deadlines and fines. Phishing was one of the main entry vectors for malware in 2021 - including ransomware. Due to the attackers' clever methods, antivirus programs and firewalls are no longer sufficient.

Protection through digital quarantine

The best protection is offered by a virtual browser. This prevents external access by hackers. The R&S®Browser in the Box from Rohde & Schwarz Cybersecurity creates a "digital" quarantine. It enables the separation of intranet and Internet at the network level as well as isolation at the computer level. Encryption of end devices, a highly secure VPN connection and protection of the home WLAN can also protect against attacks.

Find further information on protecting CRITIS on our solution site.

Contact Us




私は、Rohde & Schwarz GmbH & Co. KGおよび本ウェブサイトのインプリントに記載されているローデ・シュワルツの事業体または子会社から、電子メールまたは郵便でマーケティングまたは広告情報(特別キャンペーンや値引きに関する情報など)を受け取ることを希望します。個人データの使用と取り消し手順の詳細は、プライバシーステートメントおよびマーケティングパーミッション(事前許諾)に記載されています。

お問い合わせ内容が送信されました。 後ほどご連絡致します。
An error has occurred, please try again later.