By racking viruses to attack UFIDA users, see security is the corporate corporate cornerstone

Author:Sword finger Time:2022.09.02

Text/Yang Jianyong

In recent years, with the acceleration and digital upgrades of various industries, in this context, the security challenges of information security have faced unprecedented security challenges. Apply to the cloud and then deployed the Internet of Things and edge smart devices deployed in various corners. With the continuous deepening of digital transformation, the construction of new business and scenes has also triggered new security challenges, such as data loss, data leakage, data compliance and data privacy security. A few days ago, UFIDA's atmosphere T+software clients were attacked by ransomware, causing concern to safety.

Fire Velvers Safety Checking Map

The fire velvet security laboratory pointed out in the night of August 29 that the fire velvet safety laboratory monitoring was abnormally active with the help of the ransom virus module spreading virus modules spread by the UFICATO (FakeTPlus). When the fireproof engineers checked the ransom scene, they found that the launch time of the virus module was similar to the upgrade time of the UFICAC T+software module used by the victim. It does not rule out that hackers are poisoned by supply chain pollution or vulnerabilities. Fire velvet security software can successfully kill the virus.

It can be seen at the scene of the poisoning that the back door virus module is located in the BIN directory of UFI Changjietong T+software. The relevant documents are as shown in the figure below:

Position in the back door virus module file of the poisoning site (from Weibo Safety Laboratory)

The 360 ​​Security Guard issued a post on August 29: The 0DAY vulnerability of a popular business financial software may be used for large -scale ransom! According to the analysis of the vulnerability of the 360 ​​vulnerability cloud, since August 28, 2022, the attack case from the ransomware has exceeded more than 2,000 cases, and the number is still rising.

Chang Jietong issued a description of a small number of Changjietong T+software users who encountered a ransom virus attack, saying that a small number of T+software customers also feedback to be attacked by the extortion virus. After verification, the software server of this part of the customer is deployed by the customer and does not do the necessary cybersecurity protection. Among them, customers who have made data backups in accordance with the system prompts have been resolved by restoring the backup data. Only a few customers have been affected, and technical engineers and service providers have actively assisted customers to solve the problem. It is also recommended that customers upgrade to public cloud services operated by Changjietong or use the Changyun Butler and other cloud -protection cloud deployment methods.

In August, the domestic home appliance giant Midea group had encountered virus attacks. Midea Group responded on the official Weibo that the Internet passed on to the virus ransom rumor. A small number of employees' computers were infected, the company's various business systems were not affected, the operations were proceeded normally, and ransom information was not received. In my opinion, security is the top priority.

In the background of the current digitalization, the wave of digitalization is turbulent, while small and medium -sized enterprises are facing the increasingly severe digital security situation. According to the survey data of the "Small and Small and Micro Enterprise Digital Security Report (2022)" led by the 360 ​​Tianshu Think Tank, in the past 12 months, the most destructive digital attack threats against small and medium -sized enterprises in my country are: malware (malware ( 68%), ransom attack (65.3%), system vulnerabilities (64%) and online fishing (42.7%).

The data statistics of Devolutions are the most threatened digital attacks on small and small enterprises around the world: ransom attack (73%), online fishing (60%), malware (42%), and cloud computing vulnerabilities (30%). Obviously, ransom attacks, online fishing and malware are the most important threats facing small and medium -sized enterprises. It is worth mentioning that in the process of digitalization, security is the first choice for enterprises to implement digitalization, which involves network security, data security, privacy security, compliance security, and so on. Especially in the process of enterprises and clouds, security and compliance are the cornerstones of digital transformation.

You know, in the past few years, under the influence of the new crown epidemic, all circles have accelerated the digitalization strategy, thereby driving intelligent transformation and upgrading to achieve cost reduction and efficiency. In this context, the importance of security is particularly important. Only by solving the problem of security can we ensure the advancement of digital strategy, and then through digital innovation and enhance operational efficiency, laying a solid foundation for the sustainable development of the enterprise. With the advancement of the digitalization of enterprises, the transformation from informationization to digital intelligence, while the enterprise Shangyun is the key to promoting the digitalization process of the enterprise.

In particular, in the implementation of digitalization, small and medium -sized enterprises will host various application services to public clouds or private clouds, such as SaaS services such as ERP, HR, CRM, etc., which are favored by enterprises. UFIDA, as a representative manufacturer of enterprise services, has actively promoted the cloud service software on various enterprises in recent years, and provides enterprises with PaaS, SaaS, BAAS, DAAS and other services to the enterprise. According to customer needs The deployment method of cloud technology architecture.

However, in the implementation of digital construction, the security is the primary factor in deploying various application software services. Some Chang Jietong T+software customers encounter ransomware attacks, which will inevitably cause users to worry about security. Safety is the increasingly important cornerstone, and under the trend of the cloud of enterprises, cloud security capabilities have always been the main direction of the development of cloud computing platforms. At present, among the world's major cloud service manufacturers, Amazon Cloud Technology Cloud Safety Technology and Safety methods are particularly rich to provide users with comprehensive security services. There are currently more than 280 security, compliance services and functions in the world, covering threats, covering threats Detection and event response, identity authentication and access control, network and infrastructure security, data protection and privacy, risk control and compliance and compliance. Because Amazon Cloud Technology has rich security services, rich PaaS capabilities and SaaS ecology, injecting innovative vitality into the transformation and upgrading of thousands of industries, thereby giving the global cloud computing industry dividend, occupying the world's 40 % public cloud market share Essence In particular, domestic overseas companies, relying on their global distribution infrastructure, and deep understanding of the requirements of cloud business related safety and compliance requirements in different regions, with the help of background and capabilities, Amazon Cloud Technology is the choice of many Chinese -going companies.

Finally, in the context of digital transformation, the network security industry will usher in further development and opportunities. According to the report released by IDC, the total global network security IT investment scale in 2021 was US $ 168.77 billion, and it was expected to increase to US $ 287.57 billion in 2026. The scale of China's network security IT expenditure will reach US $ 31.86 billion in 2026, and the five -year CAGR will be about 21.2%. The growth rate continues to lead the world. The five -year CAGR is twice the world and has a broad market prospect.

Yang Jianyong, a Forbes Chinese writer, is committed to in -depth interpretation of cutting -edge technologies such as the Internet of Things, cloud services and artificial intelligence.

- END -

Haidian "Number" friend, take you to play the "Yuan Universe"

Talk to virtual numeric people with rich and delicate expressionsYou can watch the...

DIY installation consumption survey report: improve standards, pay more attention to practicality

The annual promotion of the 6.18th promotion has ended. I wonder if everyone has b...