Latest news with #WannaCry
Yahoo
7 days ago
- Business
- Yahoo
How the semiconductor industry is grappling with cybersecurity threats
This story was originally published on Manufacturing Dive. To receive daily news and insights, subscribe to our free daily Manufacturing Dive newsletter. Cybersecurity has become imperative for chipmakers looking to protect their facilities and operations from rising threats. Otherwise, they are at risk of losing tens of millions of dollars from security incidents. A single 12-inch wafer used in high-end applications — such as artificial intelligence, high performance computing, or automotive chips — can be worth upwards of $20,000. If production is interrupted during critical stages, like photolithography or plasma etching, thousands of wafers may be damaged. This can result in significant losses from wasted materials, extended downtime, delayed shipments and diminished customer confidence. On Aug. 3, 2018, a WannaCry variant affected Taiwan Semiconductor Manufacturing Co., disrupting both computer systems and manufacturing tools at multiple facilities in Taiwan. Several fabrication plants were forced to halt production and it took three days to recover approximately 80% of the affected equipment. In a 2018 report, TSMC says the virus led to nearly $84 million in losses for the third quarter. While some in the industry have disputed his views, TSMC's CEO C.C. Wei said at the time he didn't expect any hacking and 'this was purely our negligence.' At the time, a company spokesperson told Bank Info Security 'this tool arrived at our facility with a virus already on it.' The key lesson from this incident extended well beyond strengthening cybersecurity through technologies and processes. It underscored how critical security guidelines and successful implementation are across the chipmaking ecosystem. In the years that followed, semiconductor fabs systematically enhanced their cybersecurity posture through a three-stage, inside-out approach: securing operational environments, inspecting inbound devices and reinforcing supply chain cybersecurity. Further incidents have happened in the years since and the industry has made a coordinated effort, led by a consortium, to bolster its work through initiatives such as a new security standard. A growing issue Terence Liu, CEO of Taiwan-based cybersecurity firm TXOne Networks, has had a tough job over the past decade. As a key provider for TSMC, TXOne purpose-built its software and hardware to protect critical infrastructure in more than a dozen countries. Initial efforts focused on safeguarding internal operations. This included protecting critical production systems through network segmentation, endpoint protection and virtual patching to reduce exposure to known vulnerabilities. Liu said that as these internal measures matured, 'the focus expanded to securing what enters the fab environment,' adding that 'strict inspection and validation processes were established for incoming equipment and devices, particularly those introduced by employees, contractors, or integration partners.' This step helped reduce the risk of inadvertently introducing threats into highly sensitive production areas. Sources say companies came to recognize that effective cybersecurity must extend to the broader supply chain. Suppliers are now expected to demonstrate stronger security practices. This often involves completing structured questionnaires and undergoing external vulnerability scans to validate the maturity of their internal cybersecurity controls. At the same time, there is growing awareness that securing the semiconductor industry requires collective action across the entire value chain, including manufacturers, equipment vendors and software providers. Several major semiconductor firms have taken the lead in forming communities under the influential organization SEMI, formerly known as the Semiconductor Equipment and Materials International. A notable example of this collaboration is the Taiwan Semiconductor Cybersecurity Committee, chaired by TSMC. One notable outcome is the development of the SEMI E187 fab equipment cybersecurity specification. This landmark standard is tailored to the unique characteristics of semiconductor manufacturing environments, where equipment lifecycles often span decades and operational continuity is critical. The standard has evolved into a key purchasing requirement for many leading manufacturers and is now enforced throughout their supply chains. The supply chain enforcement is real and growing, with E187 certification now a baseline expectation for OEMs supplying to global fabs. TSMC's contract now mandates it, and official reference guides firmly embed it into procurement criteria. Certification bodies, such as Bureau Veritas and Intertek, offer formal assessment services and structured paths toward compliance. Companies such as Gallant, Control, and Delta have already qualified, signaling the existence of structured, scalable compliance paths, not just voluntary guidance. Looking ahead What began as a regional initiative has quickly grown into a global movement. James Tu, TSMC's head of corporate information security, outlined a vision to extend this cybersecurity uplift across the entire global semiconductor ecosystem during a talk at Semicon West in 2023. Tu plays a key role at Semi's Taiwan Cybersecurity Committee. 'Let us work together to enhance global supply chain security by influencing our own suppliers and partnering with SEMI,' he said. Tu stressed the need to influence TSMC's suppliers, collaborate with SEMI, and support the committee's members to create a ripple effect that boosts supply chain security broadly. This vision ultimately led to the formation of the Semiconductor Manufacturing Cybersecurity Consortium, a global group dedicated to advancing cyber resilience across the semiconductor supply chain. SMCC aims to unite chipmakers, equipment firms, cybersecurity vendors and nonprofits to safeguard semiconductor production from rising cyber threats. Its working groups focus on building implementation frameworks, aligning with global regulations and strengthening supply chain resilience. SMCC also monitors regulations such as the European Union's Cyber Resilience Act. In the past, each semiconductor fab required suppliers to complete its own cybersecurity questionnaire, which placed a heavy burden on suppliers who had to respond to numerous, varying assessments. SMCC consolidated expert input and developed a unified cybersecurity assessment questionnaire, serving as a standardized baseline for self-assessment and continuous improvement. This reduced the time and effort required from suppliers. SMCC also published the NIST Cybersecurity Framework 2.0 Semiconductor Profile. During a February 2023 NIST workshop, then-Cybersecurity and Infrastructure Security Agency Director Jen Easterly applauded NIST's work to update the framework. She and CISA had been pushing for the technology community to focus on 'product safety' and 'the idea that software and hardware must be secure by design and secure by default'. She said the framework had been useful to companies seeking out a clear and actionable foundation for implementation — especially one that aligns with globally recognized best practices. This comes as the sector still faces a wave of cyber threats, with attackers targeting critical infrastructure, intellectual property, and production systems. Advanced persistent threats, ransomware and firmware-level attacks are becoming more sophisticated, often backed by nation-state actors. Experts say that what distinguishes the semiconductor industry in its cybersecurity transformation is the ability to combine deep technical expertise with a collaborative, long-term plan that involves shared responsibility. While not every industry operates with the semiconductor industry's high level of complexity or automation, the principles are broadly applicable: Cybersecurity is no longer optional. It's a foundational element of operational resilience and business trust. As TXOne Networks' Liu likes to emphasize, 'strong [operational technology] security not only protects production but also safeguards long-term competitiveness.' Recommended Reading Cyberattacks in manufacturing: What's driving the trend?

Engadget
22-07-2025
- Politics
- Engadget
New UK law would ban ransomware payments by publicly funded orgs
The British government has announced plans to move forward with a law that would bar public organizations from paying off ransomware attackers. The proposed legislation would add schools, town councils, National Health Service (NHS) hospitals and critical infrastructure managers to a ban which already applies to the national government. The logic behind banning payments is simple. If cybercriminals know a ransomware attack against a UK school or hospital won't get them paid, they'll look somewhere else for a more lucrative target. Security Minister Dan Jarvis said that the government is "determined to smash the cyber criminal business model," and added that laws in the proposed package will require even private businesses to seek guidance from the government before paying a ransom. Since the WannaCry attack on the NHS in 2017 launched the modern era of ransomware attacks, the UK has suffered a number of serious incidents. In the last two years alone , attacks have hit the British Library, the BBC and the Ministry of Defence. This may explain why, according to the government's announcement, "nearly three quarters" of public comments on the ban legislation were supportive. ADVERTISEMENT Advertisement Although bans on ransom payments are a popular solution to the ever-increasing scourge of ransomware, there's currently not much data on whether they work. Two US states, North Carolina and Florida, have enacted similar bans, but it's hard to say what impact they've had . Critics argue that some organizations, especially hospitals, can't afford the long-term disruption of leaving the ransom unpaid, and may choose to pay in unaccountable ways . Furthermore, some hacking groups have aims other than money, and may continue ransomware attacks to sow political chaos . The UK is moving into uncharted territory as the first nation to pass a ransomware payment ban. We'll be interested to see whether it helps get attacks under control. Either way, the outcome is likely to inform how other countries respond to the continuing threat of cybercrime.


Time of India
22-07-2025
- Business
- Time of India
One password, 700 jobs lost: How a ransomware attack crushed a 158-year-old UK firm
It took just one weak password for cybercriminals to bring down KNP, a 158-year-old transport company based in Northamptonshire—leaving 700 people without jobs and a legacy in ruins. KNP, which operated a fleet of 500 lorries under the Knights of Old brand, is one of tens of thousands of UK businesses hit by ransomware gangs. Even retail giants like M&S, Harrods, and Co-op have been recent targets. Co-op's CEO confirmed that data from all 6.5 million members had been stolen in a recent attack. Explore courses from Top Institutes in Please select course: Select a Course Category Data Analytics healthcare Public Policy Cybersecurity Digital Marketing Product Management MCA MBA Management Data Science Healthcare Artificial Intelligence Degree PGDM Finance others Design Thinking Project Management Leadership Data Science Others CXO Operations Management Technology Skills you'll gain: Data Analysis & Visualization Predictive Analytics & Machine Learning Business Intelligence & Data-Driven Decision Making Analytics Strategy & Implementation Duration: 12 Weeks Indian School of Business Applied Business Analytics Starts on Jun 13, 2024 Get Details In KNP's case, the breach likely began with hackers guessing a single employee's password. That opened the door to a full-scale digital siege. The attackers, identified as the notorious Akira ransomware group, encrypted the company's systems, locking staff out of critical data. The only way out? Pay a ransom that experts estimated could be as high as £5 million—a sum KNP couldn't afford. "If you're reading this it means the internal infrastructure of your company is fully or partially dead…Let's keep all the tears and resentment to ourselves and try to build a constructive dialogue," read the ransom note. Despite industry-compliant IT systems and cyber insurance, KNP had no way to recover its data. The company collapsed under the weight of the attack. Director Paul Abbott, visibly shaken, says he never told the employee whose password may have triggered the disaster. Live Events The UK has been the victim of many high-profile ransomware attacks in recent years, from the "WannaCry" cyber attack that crippled Britain's National Health Service in 2017 to the British Library suffering disruption when it refused to pay a ransom in 2023. Ransomware, which is malicious software used by criminals to access victims' computer systems, encrypt data, or steal information and hold it hostage until a ransom is paid, is estimated to cost the economy millions of pounds each year.


The Star
22-07-2025
- Business
- The Star
UK plans to ban public sector bodies from paying ransom to cyber criminals
FILE PHOTO: Clouds hang above the Houses of Parliament in central London, Britain, June 24, 2017. REUTERS/Marko Djurica/File Photo LONDON (Reuters) -Britain plans to ban public sector bodies and operators of critical national infrastructure, including the state-run health service, local councils and schools, from paying ransom demands to cyber criminals, it said on Tuesday. The country has been the victim of many high-profile ransomware attacks in recent years, from the "WannaCry" cyber attack that crippled Britain's National Health Service in 2017 to the British Library suffering disruption when it refused to pay a ransom in 2023. "We're determined to smash the cyber criminal business model and protect the services we all rely on," security minister Dan Jarvis said in a statement. "We are sending a clear signal that the UK is united in the fight against ransomware." Ransomware, which is malicious software used by criminals to access victims' computer systems, encrypt data, or steal information and hold it hostage until a ransom is paid, is estimated to cost the economy millions of pounds each year, the statement said. The recent attacks highlight "the severe operational, financial, and even life-threatening risks," it said. The package of measures includes a ransomware payment prevention regime for victims of ransomware attacks and a ransomware incident reporting regime. A more recent attack on the NHS was cited as one of the factors that contributed to a patient's death, according to the statement. A slew of attacks on British retailers from Marks & Spencer to Co-op Group have also shaken public confidence this year. Under the proposals, businesses not covered by the planned ban would be required to notify the government of any intent to pay a ransom, so they can be provided with advice and support, while mandatory reporting is also being developed to equip law enforcement with essential intelligence to deal with perpetrators and disrupt their activities. (Reporting by Muvija M in London; Editing by Nia Williams)

Straits Times
22-07-2025
- Business
- Straits Times
UK plans to ban public sector bodies from paying ransom to cyber criminals
LONDON - Britain plans to ban public sector bodies and operators of critical national infrastructure, including the state-run health service, local councils and schools, from paying ransom demands to cyber criminals, it said on Tuesday. The country has been the victim of many high-profile ransomware attacks in recent years, from the "WannaCry" cyber attack that crippled Britain's National Health Service in 2017 to the British Library suffering disruption when it refused to pay a ransom in 2023. "We're determined to smash the cyber criminal business model and protect the services we all rely on," security minister Dan Jarvis said in a statement. "We are sending a clear signal that the UK is united in the fight against ransomware." Ransomware, which is malicious software used by criminals to access victims' computer systems, encrypt data, or steal information and hold it hostage until a ransom is paid, is estimated to cost the economy millions of pounds each year, the statement said. The recent attacks highlight "the severe operational, financial, and even life-threatening risks," it said. The package of measures includes a ransomware payment prevention regime for victims of ransomware attacks and a ransomware incident reporting regime. A more recent attack on the NHS was cited as one of the factors that contributed to a patient's death, according to the statement. A slew of attacks on British retailers from Marks & Spencer to Co-op Group have also shaken public confidence this year. Under the proposals, businesses not covered by the planned ban would be required to notify the government of any intent to pay a ransom, so they can be provided with advice and support, while mandatory reporting is also being developed to equip law enforcement with essential intelligence to deal with perpetrators and disrupt their activities. REUTERS Top stories Swipe. Select. Stay informed. Singapore Singaporeans aged 21 to 59 can claim $600 SG60 vouchers from July 22 Singapore Miscalculation of MOH subsidies and grants led to $7m in overpayments, $2m in shortfalls Singapore Singaporeans continue to hold world's most powerful passport Asia Indonesia on high alert as dry weather fans forest, peatland fires in Sumatra Singapore 2 charged over alleged role in posting bail for man who later absconded Singapore Teen charged after allegedly selling vaporisers, advertising e-cigarettes on WhatsApp Singapore 2,500 turtles seized in India and sent back to S'pore, put down humanely after salmonella detected Singapore Ports and planes: The 2 Singapore firms helping to keep the world moving