ASCO Sends Workers Home After Ransomware Attack
Aeroplane parts manufacturer sends home 1,000 of 1,400 workers after being crippled by ransomware.
A ransomware attack on one of the world’s largest suppliers of aeroplane parts, has caused it to cease production in factories across four countries.
ASCO Industries based in Belgium has also reportedly had to send home the vast majority of its workforce after the ransomware attack last Friday (7 June).
In March this year, a ransomware attack crippled the operations of large Norwegian manufacturing firm Norsk Hydro. The company estimated that it lost more than $40m in the week following that attack.
And now ASCO has become the latest firm to be impacted by ransomware, although the company is not at the moment saying anything officially about the attack.
ASCO has offices and production centres in Belgium, Germany, Canada, the US, and offices in Brasil and France.
According to VRT, the police has been notified, and the firm has brought in external experts to investigate.
The company has apparently ceased production in all of its production centres, but it has not confirmed whether the ransomware has spread to those systems, or whether the move was simply a way to stop the ransomware spreading.
Other media reports suggest the firm has sent home 1,000 of its total 1,400 workforce.
It is also not clear at this stage whether ASCO is paying the hackers, or whether it is trying to recover its systems via backups.
Security experts were quick to highlight the dangers posed by ransomware attacks.
“The attack against ASCO has once again highlighted the dangerous power of ransomware,” said Andrea Carcano, CPO of the co-founder of Nozomi Network. “The attack has brought operations to a halt and resulted in over a thousand employees being sent home which will be having a significant impact on the organisation financially.”
“When it comes to ransomware, prevention is always better than cure as, if infected, it is never advisable to pay the ransom as it is not guaranteed that the criminals will honour the agreement and restore systems/data,” said Carcano. “Organisations should prepare for these types of events and have an incident response plan in place to help limit the damage caused, not only to production but also to customer trust and brand reputation.”
This point was echoed by another expert who said that businesses have to prepare to be targetted by cybercriminals, and he noted the secretive way that ASCO is dealing with the attack.
“Airplane manufacturer ASCO being hit by ransomware continues the trend of cybercriminals focusing their efforts on industry and manufacturing as their targets – recognizing the costly and disruptive effect such a shutdown will have on the business,” explained Shlomie Liberow, technical program manager at HackerOne.
“This comes only a few months after Norsk Hydro was also shut down by ransomware – however, Norsk showed the world that while ransomware is costly and devastating in the moment, it doesn’t have to have a lasting effect on reputation as the open and transparent way Norsk dealt with the attack resulted in a rise in share price,” said Liberow.
“Public understanding of ransomware is on the rise so if ASCO reacts quickly and in a way that keeps relevant stakeholders informed, hopefully, it will see no lasting damage to reputation,” Liberow said.
Another expert agreed that ransomware is a growing risk.
“Ransomware continues to be a growing risk for many companies and once inside a network, unless there are controls in place to prevent the spread, it can take hold of the entire infrastructure rapidly,” said Javvad Malik, security awareness advocate at KnowBe4.
“It’s worth remembering that in most cases, the initial infection is through a phishing or spearphishing email, therefore it is important to train users and make them aware of the risks, so they can make better-informed decisions, and also escalate any potential issues where they may arise,” said Malik.
Whatever the experts may say, in April a study from Appriver revealed a worrying admission about the actions of companies after they are struck with a ransomware attack.
It found that more than half of executives (55 per cent) at small-to-medium-sized businesses (SMBs) in the US said they would pay hackers to recover their stolen data in ransomware attacks.
This directly contradicts the advice of nearly all security professionals, who urge firms not to pay but instead invest money in improving cyber defences and education, as well as ensuring that regular backups are carried out.
But it is not just companies that can be impacted by ransomware. The most famous case in recent years was probably the Wannacry ransomware scourge that infected computers around the world in 2017.
More recently, the east coast American city of Baltimore is slowly recovering after most of its computers and IT infrastructure were crippled after a devastating ransomware attack.
The cyberattack struck Baltimore’s computers on 7 May, and nearly a month later, most online city services and 10,000 computers remained crippled. That said, the city is now slowing recovering its systems.
Industry: Cyber Security News
- Contact 12 month- Security Operations- Crowdstrike Falcon Insight EDR / Analyst.
- United Kingdom
- Dependent on experience
Security Operations engineer / Analyst with Crowdstrike Falcon Insight EDR experience for a 12 month contract. Experienced Contractor with Crowdstrike Falcon Insight: Endpoint detection and Response (EDR) experience needed - 12 month rolling project. Implementation, configuration and Analyst experience needed with Crowdstrike Falcon Insight: (EDR) Migration project- relocating capability internationally. technically implementing, configuration of that that migration and then transition to BAU role monitoring. DCL Search exclusive associate Project.
- SailPoint Consultant
- Upto £75,000 plus benefits
SailPoint Consultant is needed for an expanding Financial Service business, this is an exciting time to join the Business as they are in the Process of deploying both IAM and PAM solutions and this consultant will form a key part of the IAM team Location can be flexible but would require the individual to come into the London office a couple of times a month for team meetings and face to face project reviews Duties include · Engage in the Identity & Access Management project to deliver SailPoint IdentityNow and Privileged Access Management · On-board applications and users into IAM tools and customise or configure integrations as required · Regularly review, secure and recertify privileged roles in applications, databases and operating systems · Implement least privilege, just-in-time access, password rotation and vaulting wherever possible · Migrate application authentication to Single Sign-On through the use of SAML and OAuth · Implement and enforce the use of MFA where possible, focusing on critical applications and risky sign-ins · Provide technical support to Centrify and SailPoint users Key experience required: Previous experience with SailPoint, including integrating and deploying into a business, onboarding users and applications, supporting users and performing manual administration tasks. Experience with SAML and OAuth to migrate applications to Single Sign-on. If you are interested in hearing more please reach out to me for more information
- Centrify Consultant
- Upto £75,000 plus benefits
A Privileged Access Management Consultant is needed for an expanding Financial Service business, this is an exciting time to join the Business as they are in the Process of deploying a Centrify PAM solution,, this consultant will form a key part of the team Location can be flexible but would require the individual to come into the London office a couple of times a month for team meetings and face to face project reviews Duties include · On-board applications and users into PAM tools and customise or configure integrations as required · Regularly review, secure and recertify privileged roles in applications, databases and operating systems · Implement least privilege, just-in-time access, password rotation and vaulting wherever possible · Migrate application authentication to Single Sign-On through the use of SAML and OAuth · Implement and enforce the use of MFA where possible, focusing on critical applications and risky sign-ins · Provide technical support to Centrify users You would also gain expsoure with the IAM toolset as part of an Identity Access deployment. Key experience required: Previous experience with a PAM tool (Centrify would be an added bonus but not essential) including integrating and deploying into a business, onboarding users and applications, supporting users and performing manual administration tasks. Experience with SAML and OAuth to migrate applications to Single Sign-on. If you are interested in hearing more please reach out to me for more information
- SOC team lead- Deputy SOC manager - Managed Security Services, Bradford. Exclusive
- £70,000 +
SOC team lead- Deputy SOC Manager - Managed Cyber Security Services, Bradford. Exclusive Identifier project. Technical team lead needed to join a Managed Cyber Security Services business. The role will be a hands on lead role and technical escalation point for the team. You will also be responsible for leading, mentoring, growing and developing the team. You will be the deputy SOC manager and be involved in the strategic growth of the capability. A managed security services background is essential, specifically within a managed security operations capability. Current hands on support experience across Firewall, SIEM, Incident Response is essential.