Critical Infrastructure targeted

Critical infrastructures targeted by cyber criminals

In mid-June, the Mainz municipal utility and the Darmstadt energy supplier Entega in Germany reported a cyberattack on their systems. The attack was on the IT service provider of the energy suppliers - according to the Hessian Ministry of the Interior, the hacker attack was a ransomware attack. The ministry does not want to say how high the demanded ransom is in this case because of the ongoing investigations. And the incident has so far ended smoothly: Both the city's critical infrastructure and customer data are currently unaffected by the attack. However, there have been increased delays in bus services because not all IT systems are running properly again. Such incidents are not an isolated case. It was only in the fall of 2021 that Stadtwerke Wismar was targeted by cybercriminals. After a cyber attack, employees could no longer access company data. Although the energy supply was ensured at all times, the IT systems of the municipal utility were in emergency operation until the turn of the year.

Critical infrastructures (CRITIS), i.e. system-relevant companies and organizations, are increasingly becoming victims of hacker attacks. "Cyber attacks are almost the order of the day for CRITIS operators in all sectors," was also the verdict of the Federal Office for Information Security (BSI) in its report on the "Situation of IT Security in Germany 2021." And the BKA situation report "Cybercrime 2021" also confirms that attackers primarily targeted CRITIS and public authorities last year. The reason for this is the enormous relevance of CRITIS for the state. A successful attack can have fatal consequences for the affected organization and the civilian population. This makes them particularly vulnerable to blackmail.

Damage from ransomware on the rise

Increasingly, these attacks are ransomware attacks ¬- in which data is encrypted and often stolen, with subsequent ransom demands. The number of such extortion attacks continued to increase in 2021, according to the BKA. And the annual damage caused by ransomware has risen rapidly in recent years: from 5.3 billion euros (2019) to about 24.3 billion euros (2021). Per attack, the damage has increased by 21% on average.

At the same time, phishing is becoming more and more professionalized. Employees of a company hardly recognize such emails anymore. The fake e-mails are often used to put targeted pressure on employees by threatening them with deadlines and fines. Phishing was one of the main entry vectors for malware in 2021 - including ransomware. Due to the attackers' clever methods, antivirus programs and firewalls are no longer sufficient.

Protection through digital quarantine

The best protection is offered by a virtual browser. This prevents external access by hackers. The R&S®Browser in the Box from Rohde & Schwarz Cybersecurity creates a "digital" quarantine. It enables the separation of intranet and Internet at the network level as well as isolation at the computer level. Encryption of end devices, a highly secure VPN connection and protection of the home WLAN can also protect against attacks.

Find further information on protecting CRITIS on our solution site.

Contact Us

Do you have questions or need additional information? Simply fill out this form and we will get right back to you.

마케팅 동의

로데슈바르즈에서 다음과 같은 방법으로 정보를 수신하겠습니다

Rohde & Schwarz GmbH & Co. KG 및 본 웹사이트의 기업 정보에 명시된 Rohde & Schwarz 각 법인 또는 각 지사가 마케팅 및 광고 목적(예: 특별 행사 및 할인 프로모션에 대한 정보)으로 이메일 또는 우편을 통해 연락하는 것에 동의합니다. 개인 데이터 사용 및 해지 절차에 대한 자세한 내용은 개인정보 보호정책마케팅 동의 단락에 명시되어 있습니다.

신청하신 내용이 제출되었습니다. 빠른 시일 내 회신 받으실 것입니다.
An error has occurred, please try again later.