It a good time to recall the key facts in this cybersecurity 2017 retrospective.
Cyber-attacks have grown more sophisticated.
2017 is the year that we became aware of this. A collective acknowledgment which has demonstrated to us that a cyber-attack can now stop a company’s production tools, whatever their size or their location in the world.
2017 was the year that digital arms proliferated.
In April, the “shadow brokers” hacker group distributed tools taken from the NSA.
The “shadow brokers” distributed a second batch of computer programs taken from the NSA on April 14, 2017.
This act was significant in the IT and cyber security world.
For the first time, sophisticated operating tools for Windows operating systems are no longer the exclusive prerogative of a country.
The technological barrier was stormed, allowing any hacker group to launch a large-scale cyber-attack.
It was only a few weeks later that WannaCry appeared, which was developed using two vulnerabilities found at the NSA, called “eternal blue” and “double pulsar.”
In May, “Jaff” ransomware, distributed by the Necurs botnet, targeted corporate email clients.
As you saw last may in our dedicated article, the Vade Secure filter stopped 633,920 emails containing Jaff ransomware in 48 hours.
Distributed by the Necurs botnet, this malware, which was very similar in design to Locky ransomware, targeted many companies within a very short period.
Using a 0-day fault from the Microsoft Office suite, this malware was able to download a malicious program when opening an attachment.
Microsoft took several days to publish a corrective action, leaving users who had no filtering solution with unprotected emails.
Find our contribution to this subject on the broadcast by Tech & Co. on BFM Business (video).
WannaCry hit companies and people in May 2017.
Due to WannaCry, companies including FedEx in the US, Renault and Saint Gobain in France, were required to stop their production for several days.
Using faults which had not been known, WannaCry affected thousands of companies in more than 150 countries, infecting 300,000 machines using the Windows operating system.
This ransomware was covered so often by traditional media that the term “ransomware” became a trending search for several weeks on Google.