logo
#

Latest news with #EclecticIQ

Businesses urged to strengthen cyber defences amid increase in Iran-adjacent attacks
Businesses urged to strengthen cyber defences amid increase in Iran-adjacent attacks

Yahoo

time25-06-2025

  • Business
  • Yahoo

Businesses urged to strengthen cyber defences amid increase in Iran-adjacent attacks

UK businesses have been warned by the government to redouble their cybersecurity efforts - as experts warn of increased Iran-adjacent attacks following the escalation of tensions in the Middle East. Cybersecurity researchers shared with Sky News details of an increase in action from online actors promoting Tehran taking aim at UK-based organisations, along with American and Israeli targets. Analysis from cybersecurity firm EclecticIQ noted a "significant uptick" in cyberattacks since the start of the Israel-Iran conflict started around a fortnight ago. Politics latest: PM 'confident' he'll remain Labour leader The company said this included evidence of "growing collaborations between pro-Iranian and pro-Russian hacktivist groups". Speaking at a NATO summit today, Prime Minister Sir Keir said the likes of Iran and Russia were carrying out cyberattacks "on a regular basis" - adding that the UK had "to be prepared for them". The prime minister added that cyberattacks should be considered "an attack on our country". In response to the increase in attacks, a government spokesperson told Sky News: "UK businesses face a growing number of threats from domestic and foreign cyber criminals who are intent on disrupting not only their operations, but our wider digital economy. "While some companies are already taking steps to better protect themselves, it is vital that - regardless of size or sector - they all take immediate steps to review and strengthen their defences." Among the attacks seen recently were distributed denial of service - DDoS - attacks against British companies, including those in the defence sector. This involves trying to flood a company's computer networks with traffic in a bid to make it crash. Read more: As well as DDoS attacks, malware that deletes data was also deployed, with misinformation and "influence operations" also increasing. It is difficult to establish who is carrying out attacks, including where they are located. Analysis of techniques and technical factors can point to an origin. One DDoS attack was launched at outsourcing giant Serco, although the company said its "robust security operations infrastructure prevented the attack". EclecticIQ says the scope of the attacks has extended past Israeli entities, with organisations in the US, UK and EU all targeted. Cody Farrow, EclecticIQ's chief executive officer, warned businesses should not "assume they are out of scope". Before working in the private sector, Mr Barrow was a senior intelligence officer in the US department of defence at the Pentagon, as well as the NSA and US cyber command. He told Sky News: "UK companies could be being targeted not because of what they've done, but because of what they represent - which means resilience and remediation playbooks are crucial." 👉Search for The Wargame on your podcast app👈 Mr Farrow said Iran could retaliate against Israeli attacks in "unexpected ways" and has a history of responding to attacks via cyber operations. "Retaliation may not be immediate or proportional, and could target companies with ties to Israel, entities perceived as supporting Israeli or Western operations, or symbolic infrastructure," he said.

Businesses urged to strengthen cyber defences amid increase in Iran-adjacent attacks
Businesses urged to strengthen cyber defences amid increase in Iran-adjacent attacks

Sky News

time25-06-2025

  • Business
  • Sky News

Businesses urged to strengthen cyber defences amid increase in Iran-adjacent attacks

UK businesses have been warned by the government to redouble their cybersecurity efforts - as experts warn of increased Iran-adjacent attacks following the escalation of tensions in the Middle East. Cybersecurity researchers shared with Sky News details of an increase in action from online actors promoting Tehran taking aim at UK-based organisations, along with American and Israeli targets. Analysis from cybersecurity firm EclecticIQ noted a "significant uptick" in cyberattacks since the start of the Israel-Iran conflict started around a fortnight ago. The company said this included evidence of "growing collaborations between pro-Iranian and pro-Russian hacktivist groups". Speaking at a NATO summit today, Prime Minister Sir Keir said the likes of Iran and Russia were carrying out cyberattacks "on a regular basis" - adding that the UK had "to be prepared for them". The prime minister added that cyberattacks should be considered "an attack on our country". In response to the increase in attacks, a government spokesperson told Sky News: "UK businesses face a growing number of threats from domestic and foreign cyber criminals who are intent on disrupting not only their operations, but our wider digital economy. "While some companies are already taking steps to better protect themselves, it is vital that - regardless of size or sector - they all take immediate steps to review and strengthen their defences." Among the attacks seen recently were distributed denial of service - DDoS - attacks against British companies, including those in the defence sector. This involves trying to flood a company's computer networks with traffic in a bid to make it crash. As well as DDoS attacks, malware that deletes data was also deployed, with misinformation and "influence operations" also increasing. It is difficult to establish who is carrying out attacks, including where they are located. Analysis of techniques and technical factors can point to an origin. One DDoS attack was launched at outsourcing giant Serco, although the company said its "robust security operations infrastructure prevented the attack". EclecticIQ says the scope of the attacks has extended past Israeli entities, with organisations in the US, UK and EU all targeted. Cody Farrow, EclecticIQ's chief executive officer, warned businesses should not "assume they are out of scope". Before working in the private sector, Mr Barrow was a senior intelligence officer in the US department of defence at the Pentagon, as well as the NSA and US cyber command. He told Sky News: "UK companies could be being targeted not because of what they've done, but because of what they represent - which means resilience and remediation playbooks are crucial." Mr Farrow said Iran could retaliate against Israeli attacks in "unexpected ways" and has a history of responding to attacks via cyber operations. "Retaliation may not be immediate or proportional, and could target companies with ties to Israel, entities perceived as supporting Israeli or Western operations, or symbolic infrastructure," he said.

Chinese state accused of hacking NHS hospitals
Chinese state accused of hacking NHS hospitals

Yahoo

time29-05-2025

  • Health
  • Yahoo

Chinese state accused of hacking NHS hospitals

Chinese cyber criminals have been accused of targeting two NHS hospitals as part of an alleged espionage campaign orchestrated by Beijing. An urgent NHS investigation has been launched into data breaches at University College Hospital and University Hospital Southampton, which took place earlier this month. Cyber security experts at intelligence firm EclecticIQ have said that the hackers responsible are linked to a group in China tasked with intelligence gathering They discovered that the group has conducted a string of attacks across the world, potentially targeting hospitals, local authorities and businesses in countries such as Japan, Germany and the US. Cody Barrow, chief executive of EclecticIQ and a former US intelligence official, said it had discovered 'credible and urgent indicators' that the NHS hospitals had been 'compromised by cyber attackers'. He said his firm had evidence that 'malicious actors' had breached both hospitals by exploiting software provided by tech company Ivanti, which is used to manage mobile devices connected to a broader network. Earlier this month, Ivanti confirmed that it had uncovered a 'very limited number of customers whose solution has been exploited'. NHS England said there was 'currently no evidence to suggest patient data has been accessed' and that no frontline services had been affected. A spokesman said: 'We are currently investigating this potential incident with cyber security partners, including the National Cyber Security Centre, and the trusts mentioned.' However, a spokesman for University College Hospital told Digital Health News that some staff mobile phone numbers may have been stolen. Affected employees are now being contacted. EclecticIQ said it had uncovered data that suggested the hacks had originated in China, linked to a group it believed was 'targeting high-value individuals within public institutions, including government agencies, or in the private sector'. The news comes after John Healey, the Defence Secretary, announced plans to spend more than £1bn on cyber defence and artificial intelligence. This will include a new Cyber and Electromagnetic Command, which will seek to fight enemies online. It is not the first time that the NHS has been targeted by cyber attackers. In 2017, a cyber attack originating from North Korea devastated NHS IT systems and cost tens of millions of pounds. Last year, Synnovis, a business that provided diagnostic services to the NHS, was also hacked, disrupting more than 10,000 appointments and more than 1,700 elective procedures. NHS data has revealed it also led to at least two cases of 'severe' patient harm, meaning long-term or permanent health damage. The incident cost Synnovis more than £32m. Meanwhile, an NHS hospital trust on the Wirral revealed that a hack in November led to missed cancer waiting list targets, while also costing up to £3m. The latest incident comes amid a spree of attacks against major British companies, with Marks & Spencer and Co-op recently compromised by cyber criminals. Broaden your horizons with award-winning British journalism. Try The Telegraph free for 1 month with unlimited access to our award-winning website, exclusive app, money-saving offers and more.

Chinese state accused of hacking NHS hospitals
Chinese state accused of hacking NHS hospitals

Yahoo

time29-05-2025

  • Health
  • Yahoo

Chinese state accused of hacking NHS hospitals

Chinese cyber criminals have been accused of targeting two NHS hospitals as part of an alleged espionage campaign orchestrated by Beijing. An urgent NHS investigation has been launched into data breaches at University College Hospital and University Hospital Southampton, which took place earlier this month. Cyber security experts at intelligence firm EclecticIQ have said that the hackers responsible are linked to a group in China tasked with intelligence gathering They discovered that the group has conducted a string of attacks across the world, potentially targeting hospitals, local authorities and businesses in countries such as Japan, Germany and the US. Cody Barrow, chief executive of EclecticIQ and a former US intelligence official, said it had discovered 'credible and urgent indicators' that the NHS hospitals had been 'compromised by cyber attackers'. He said his firm had evidence that 'malicious actors' had breached both hospitals by exploiting software provided by tech company Ivanti, which is used to manage mobile devices connected to a broader network. Earlier this month, Ivanti confirmed that it had uncovered a 'very limited number of customers whose solution has been exploited'. NHS England said there was 'currently no evidence to suggest patient data has been accessed' and that no frontline services had been affected. A spokesman said: 'We are currently investigating this potential incident with cyber security partners, including the National Cyber Security Centre, and the trusts mentioned.' However, a spokesman for University College Hospital told Digital Health News that some staff mobile phone numbers may have been stolen. Affected employees are now being contacted. EclecticIQ said it had uncovered data that suggested the hacks had originated in China, linked to a group it believed was 'targeting high-value individuals within public institutions, including government agencies, or in the private sector'. The news comes after John Healey, the Defence Secretary, announced plans to spend more than £1bn on cyber defence and artificial intelligence. This will include a new Cyber and Electromagnetic Command, which will seek to fight enemies online. It is not the first time that the NHS has been targeted by cyber attackers. In 2017, a cyber attack originating from North Korea devastated NHS IT systems and cost tens of millions of pounds. Last year, Synnovis, a business that provided diagnostic services to the NHS, was also hacked, disrupting more than 10,000 appointments and more than 1,700 elective procedures. NHS data has revealed it also led to at least two cases of 'severe' patient harm, meaning long-term or permanent health damage. The incident cost Synnovis more than £32m. Meanwhile, an NHS hospital trust on the Wirral revealed that a hack in November led to missed cancer waiting list targets, while also costing up to £3m. The latest incident comes amid a spree of attacks against major British companies, with Marks & Spencer and Co-op recently compromised by cyber criminals.

Chinese state accused of hacking NHS hospitals
Chinese state accused of hacking NHS hospitals

Telegraph

time29-05-2025

  • Health
  • Telegraph

Chinese state accused of hacking NHS hospitals

Chinese cyber criminals have been accused of targeting two NHS hospitals as part of an alleged espionage campaign orchestrated by Beijing. An urgent NHS investigation has been launched into data breaches at University College Hospital and University Hospital Southampton, which took place earlier this month. Cyber security experts at intelligence firm EclecticIQ have said that the hackers responsible are linked to a group in China tasked with intelligence gathering They discovered that the group has conducted a string of attacks across the world, potentially targeting hospitals, local authorities and businesses in countries such as Japan, Germany and the US. Cody Barrow, chief executive of EclecticIQ and a former US intelligence official, said it had discovered 'credible and urgent indicators' that the NHS hospitals had been 'compromised by cyber attackers'. He said his firm had evidence that 'malicious actors' had breached both hospitals by exploiting software provided by tech company Ivanti, which is used to manage mobile devices connected to a broader network. Earlier this month, Ivanti confirmed that it had uncovered a 'very limited number of customers whose solution has been exploited'. NHS England said there was 'currently no evidence to suggest patient data has been accessed' and that no frontline services had been affected. A spokesman said: 'We are currently investigating this potential incident with cyber security partners, including the National Cyber Security Centre, and the trusts mentioned.' However, a spokesman for University College Hospital told Digital Health News that some staff mobile phone numbers may have been stolen. Affected employees are now being contacted. EclecticIQ said it had uncovered data that suggested the hacks had originated in China, linked to a group it believed was 'targeting high-value individuals within public institutions, including government agencies, or in the private sector'. The news comes after John Healey, the Defence Secretary, announced plans to spend more than £1bn on cyber defence and artificial intelligence. This will include a new Cyber and Electromagnetic Command, which will seek to fight enemies online. It is not the first time that the NHS has been targeted by cyber attackers. In 2017, a cyber attack originating from North Korea devastated NHS IT systems and cost tens of millions of pounds. Last year, Synnovis, a business that provided diagnostic services to the NHS, was also hacked, disrupting more than 10,000 appointments and more than 1,700 elective procedures. NHS data has revealed it also led to at least two cases of 'severe' patient harm, meaning long-term or permanent health damage. The incident cost Synnovis more than £32m. Meanwhile, an NHS hospital trust on the Wirral revealed that a hack in November led to missed cancer waiting list targets, while also costing up to £3m. The latest incident comes amid a spree of attacks against major British companies, with Marks & Spencer and Co-op

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store