Experts Reacted On Musk Confirms Russian Hack Targeted Tesla Factory

The US authorities arrested and charged a Russian national in US who was recruiting and convincing a Tesla’s employee to install a malware at Tesla factory in Nevada. The Telsa CEO Elon Musk also confimed the plot by tweet.The cybersecurity experts reacted on this new plot.


EXPERTS COMMENTS
Matt Walmsley, EMEA Director,  Vectra
September 01, 2020
Ransomware operators have evolved into using “name and shame” tactics whereby the victim’s data is exfiltrated prior to encryption.
Ransomware attackers seek internal access to privileged entities associated with accounts, hosts, and services given the unrestricted access they can provide and the ease of replication and propagation.  In this case, the recruitment or coercion of a Tesla insider to aid the attempted deployment of malware tools to stage their attack shows the lengths ransomware groups will go to. Ransomware ope ....
[Read More >>]
Warren Poschman, Senior Solutions Architect,  comforte AG
August 31, 2020
Data-centric security offers the most benefit by allowing data to be protected and remain secure even if it is shared, stolen, or misused.
As the threat landscape continues to get nastier by the day, ransomware attacks like the one attempted against Tesla are still at the forefront and on the rise. What’s interesting about the Tesla attempt is that the attackers attempted to co-op Tesla employees with the promise of a big payout – something that they fortunately turned down. However, in many cases this story has the potential to ....
[Read More >>]
Andrea Carcano, Co-founder and CPO,  Nozomi Networks
August 31, 2020
As a result, when it comes to ransomware prevention will always be better than a cure.
Ransomware attackers are demanding higher ransoms, aimed at larger and more critical organizations, echoing a trend we identified in a recent study of common threats. The proliferation and complexity of ransomware attacks signifies the growing need for organizations to take the necessary steps to secure their systems. It is never advisable to pay the ransom, and organizations that give in to the h ....
[Read More >>]
Katie Nickels, Director of Threat Intelligence ,  Red Canary
August 31, 2020
In particular, ransomware is generally perceived as an external threat - it’s often delivered through emails or websites.
This indictment represents an interesting convergence of external threats and insider threats, which professionals traditionally have thought of separately. In particular, ransomware is generally perceived as an external threat - it’s often delivered through emails or websites. Before this indictment, many organizations likely did not have insider-enabled ransomware in their threat model, but th ....
[Read More >>]
Andrea Carcano, Co-founder and CPO,  Nozomi Networks
August 31, 2020
A robust cyber defense strategy is the first line of defense against a ransomware attack.
Ransomware attackers are demanding higher ransoms, aimed at larger and more critical organizations, echoing a trend we identified in a recent study of common threats. The proliferation and complexity of ransomware attacks signifies the growing need for organizations to take the necessary steps to secure their systems. It is never advisable to pay the ransom, and organizations that give in to the ....
[Read More >>]
Warren Poschman, Senior Solutions Architect,  comforte AG
August 31, 2020
Data-centric security offers the most benefit by allowing data to be protected and remain secure even if it is shared, stolen, or misused.
As the threat landscape continues to get nastier by the day, ransomware attacks like the one attempted against Tesla are still at the forefront and on the rise. What’s interesting about the Tesla attempt is that the attackers attempted to co-op Tesla employees with the promise of a big payout – something that they fortunately turned down. However, in many cases this story has the potential ....
[Read More >>]
Niamh Muldoon, Senior Director of Trust and Security EMEA,  OneLogin
August 28, 2020
Always remember our employees are our greatest asset.
This attempt to attack Tesla through a ‘malicious insider’ is a brazen, if not rare, attempt to infiltrate a system. It does, however, highlight that cyber threats come in many forms. Always remember our employees are our greatest asset. We need to nurture our Trust and Security relationship with them daily. Open and honest communications from leadership across all topics including informati ....
[Read More >>]
Sam Curry, Chief Security Officer,  Cybereason
August 28, 2020
In the old days, the government and military-industrial complex were targeted.
The allegations and arrest of a Russian in an alleged plot to hack Tesla reads like a real movie script. Tesla is a hot tech company that is strategically important for the U.S. economy and it's tied to other important companies SpaceX, Hyperloop, Starlink and more. Enter a Russian spy, the use of ostensibly secure messaging app, four years of patience and trying to turn an insider. What is remark ....
[Read More >>]
Jake Moore, Cybersecurity Specialist,  ESET
August 28, 2020
Some of the biggest threats come from physical access to a network, and the insider threat can be extremely difficult to protect against.
Some of the biggest threats come from physical access to a network, and the insider threat can be extremely difficult to protect against. Employees with knowledge coupled with access can be extremely dangerous and create far more problems than external attacks, which highlights the importance of limiting user privileges where possible. However, this attack seems to have cleverly just required us ....
[Read More >>]

If you are an expert on this topic:

Submit Your Expert Comments


In this article