• Latest
  • Trending
  • All
  • Trading & Investing
  • Strategies & Techniques
  • Risk Management & Portfolio Allocation
  • Technical Analysis Tools & Indicators
  • Fundamental Analysis & Research
  • Blockchain Technology
  • DeFi & NFTs
Boeing Cyber ​​Attack: Protecting Assets from Digital Crime

Boeing Cyber ​​Attack: Protecting Assets from Digital Crime

July 4, 2024
X spaces repeat with bluhale

X spaces repeat with bluhale

May 5, 2025
Build Meowverse in Telegram Play-to-Aarn Mini Game

Build Meowverse in Telegram Play-to-Aarn Mini Game

April 4, 2025
What is the future of generative AI?

What is the future of generative AI?

April 1, 2025
How traders stay in front of the curve

How traders stay in front of the curve

March 26, 2025
How to improve crypto investment strategies using AI analysis

How to improve crypto investment strategies using AI analysis

March 23, 2025
Large XRP whale movements are concerned in the midst of Sec Appeal

Large XRP whale movements are concerned in the midst of Sec Appeal

March 21, 2025
Krypto debate raises questions about Warren’s hostile attitude

Krypto debate raises questions about Warren’s hostile attitude

March 8, 2025
Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

March 8, 2025
Bitcoin price forecast – Forbes Advisor Australia

Bitcoin price forecast – Forbes Advisor Australia

March 7, 2025
3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

February 28, 2025
4 Crypto Price Analysis Patforms that can improve your trades

4 Crypto Price Analysis Patforms that can improve your trades

February 28, 2025
From pennies to wealth in the satirical world of tap-to-earn game: interview with bums

From pennies to wealth in the satirical world of tap-to-earn game: interview with bums

February 27, 2025
  • Home
  • Trading & Investing
    • Risk Management & Portfolio Allocation
    • Strategies & Techniques
    • Fundamental Analysis & Research
    • Technical Analysis Tools & Indicators
  • Crypto News & Analysis
    • Bitcoin
    • Market Overview & Trends
    • Altcoins
    • Technical Analysis & Charting
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
  • Blockchain Technology
    • Supply Chain & Logistics Solutions
    • Enterprise Adoption & Applications
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives
Thursday, May 8, 2025
  • Login
UnCirculars
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • Crypto News & Analysis
    • All
    • Adoption & Use Cases
    • Altcoins
    • Bitcoin
    • Market Overview & Trends
    • On-Chain Data & Metrics
    • Security & Scams
    • Technical Analysis & Charting
    X spaces repeat with bluhale

    X spaces repeat with bluhale

    Build Meowverse in Telegram Play-to-Aarn Mini Game

    Build Meowverse in Telegram Play-to-Aarn Mini Game

    What is the future of generative AI?

    What is the future of generative AI?

    How traders stay in front of the curve

    How traders stay in front of the curve

    How to improve crypto investment strategies using AI analysis

    How to improve crypto investment strategies using AI analysis

    Large XRP whale movements are concerned in the midst of Sec Appeal

    Large XRP whale movements are concerned in the midst of Sec Appeal

    Krypto debate raises questions about Warren’s hostile attitude

    Krypto debate raises questions about Warren’s hostile attitude

    Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

    Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

    Bitcoin price forecast – Forbes Advisor Australia

    Bitcoin price forecast – Forbes Advisor Australia

    3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

    3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

    • Bitcoin
    • Altcoins
    • Market Overview & Trends
    • Technical Analysis & Charting
    • On-Chain Data & Metrics
    • Adoption & Use Cases
    • Security & Scams
    • Opinion & Predictions
  • Blockchain Technology
    • Enterprise Adoption & Applications
    • Supply Chain & Logistics Solutions
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives
    • Gaming & Metaverse Infrastructure
    • Web3 Development & Decentralization
    • DAO & Governance Protocols
    • Scalability & Interoperability Solutions
    • Privacy & Security Enhancements
  • Trading & Investing
    • Strategies & Techniques
    • Risk Management & Portfolio Allocation
    • Technical Analysis Tools & Indicators
    • Fundamental Analysis & Research
    • Market Psychology & Sentiment
    • Crypto Tax Implications
    • Institutional Investment Landscape
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
  • Regulation & Policy
    • Global Regulatory Landscape
    • SEC, CFTC, and Government Actions
    • Tax Implications & Reporting
    • KYC/AML Compliance & Standards
    • Institutional Investment Guidelines
    • Central Bank Digital Currencies (CBDCs)
    • Stablecoin Regulation & Oversight
    • Self-Regulatory Organizations (SROs)
  • Security & Scams
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
    • Rug Pulls & Exit Scams
    • Malware & Ransomware Threats:
    • User Education & Best Practices
    • Regulatory Frameworks & Protections
    • Insurance & Recovery Options
  • Community & Culture
    • Crypto Influencers & Thought Leaders
    • Social Media & Online Communities
    • Memes & Internet Culture
    • Crypto Art & Music
    • Events & Conferences
    • Adoption in Developing Countries
  • Opinion & Education
    • Expert Commentaries & Predictions
    • Beginner Guides & Tutorials
    • Glossary of Crypto Terms
    • Research Papers & Whitepapers
    • Podcasts & Video Interviews
    • Book Reviews & Recommendations
No Result
View All Result
UnCirculars
No Result
View All Result
Home Crypto News & Analysis Security & Scams

Boeing Cyber ​​Attack: Protecting Assets from Digital Crime

by Emily Green
July 4, 2024
in Security & Scams
0
Boeing Cyber ​​Attack: Protecting Assets from Digital Crime
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter


Boeing admitted it fell victim to a cyber incident earlier this week that affected parts of its distribution business.

The organization, which is one of the world’s largest defense and space contractors, acknowledged the attack and said it was currently investigating with law enforcement.

Days earlier, the Lockbit cybercrime gang stated that it had stolen large amounts of sensitive data from Boeing in a ransom attack, and said it would publish the content online if Boeing did not pay by November 2, 2023.

According to TechCrunch, paying ransoms to sanctioned hacking groups and ransomware gangs may violate the law in the United States.

Ransomware orchestrated by large gangs leaves even the largest businesses vulnerable

“This issue does not affect flight safety,” a Boeing spokesman told Reuters. “We are actively investigating the incident and coordinating with law enforcement and regulatory authorities. We are notifying our customers and suppliers.”

Last year, Lockbit was one of the most active global ransomware groups based on the number of victims, affecting 1,700 US organizations since 2020, according to the US Cybersecurity and Infrastructure Agency (CISA).

The hacking group typically deploys ransomware on a victim organization’s system to shut it down, as well as steal sensitive data for blackmail.

It is currently unclear what data Lockbit may have stolen from Boeing. As an aerospace and manufacturing industry leader with government connections, it’s easy to see why Boeing is an attractive target for threat actors seeking access to sensitive information.

It will also inevitably have an impact on the company’s global supply chain and it will therefore be essential that Boeing can rectify the issue quickly.

Manufacturers must continue to invest in cybersecurity

These types of cyber attacks in the industry are on the rise, with manufacturers in particular keen to invest in more sophisticated cyber security measures. As manufacturing becomes more dependent on new technology, it is more important than ever for organizations to adopt stronger security measures to protect data.

Research from 2022 shows less than two-thirds (62%) of manufacturers have a formal cyber security plan in place – showing there is a long way to go.

James Dyer, Threat Intelligence Lead at Egress, says of the attack: “This incident is concerning not only because of its immediate threat, but also in terms of the fallout. With Boeing, the attackers use dual blackmail methods by threatening to expose or sell the data. Ultimately, the company and customers may now be at increased risk of increased phishing attacks using credentials compromised in the other initial attack – also known as Business Email Compromise (BEC).

“For example, in a supply chain, a single supplier being compromised can result in a large percentage of their customers being compromised as well; the military customers in Boeing’s supply chain undoubtedly make them a very attractive target. The attacker seizes this opportunity to leverage trusted relationships as an entry point and socially engineer their victims. The threat actor is likely to use highly pressured techniques on their victim, such as insisting on urgency and confidentiality or using the seniority of who they are impersonating.

He continues: “Often ransomware attacks give their victims 10 days to respond, but in this incident only 6 days were offered to increase the pressure.

“When an attack is presented in the guise of a trusted colleague or business partner, it is suddenly much more difficult to distinguish between a genuine and a malicious email. Organizations are then exposed to account takeover, data exfiltration and financial losses due to fraudulent payments.

“Employees need to be aware of the risk and how to put an action plan in place to not only understand why an email was flagged as dangerous, but also to identify compromise from a trusted source.”

*****

For more insights into the world of Cyber ​​- check out the latest issue of Cyber ​​Magazine and follow us on LinkedIn and Twitter.

Other magazines that may be of interest – Technology Magazine | AI Journal.

Please also check out our upcoming event – Cloud and 5G LIVE on 11 and 12 October 2023.

*****

BizClik is a global provider of B2B digital media platforms covering executive communities for CEOs, CFOs, OMOs, sustainability leaders, procurement and supply chain leaders, technology and AI leaders, cyber leaders, FinTech and InsurTech leaders, as well as industries such as manufacturing, Mining, Energy, EV, Construction, Healthcare and Food.

BizClik – based in London, Dubai and New York – offers services such as content creation, advertising and sponsorship solutions, webinars and events.

Disclaimer for Uncirculars, with a Touch of Personality:

While we love diving into the exciting world of crypto here at Uncirculars, remember that this post, and all our content, is purely for your information and exploration. Think of it as your crypto compass, pointing you in the right direction to do your own research and make informed decisions.

No legal, tax, investment, or financial advice should be inferred from these pixels. We’re not fortune tellers or stockbrokers, just passionate crypto enthusiasts sharing our knowledge.

And just like that rollercoaster ride in your favorite DeFi protocol, past performance isn’t a guarantee of future thrills. The value of crypto assets can be as unpredictable as a moon landing, so buckle up and do your due diligence before taking the plunge.

Ultimately, any crypto adventure you embark on is yours alone. We’re just happy to be your crypto companion, cheering you on from the sidelines (and maybe sharing some snacks along the way). So research, explore, and remember, with a little knowledge and a lot of curiosity, you can navigate the crypto cosmos like a pro!

UnCirculars – Cutting through the noise, delivering unbiased crypto news

Share196Tweet123
Emily Green

Emily Green

Protecting your crypto journey is Emily's mission. Her knowledge of cybersecurity threats and common scams empowers you with safe practices and secure storage solutions.

UnCirculars

Copyright © 2024 UnCirculars

Navigate Site

  • About Us
  • Advertise
  • Terms of Use
  • Disclaimer
  • Privacy Policy
  • Contact Us

Follow Us

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Trading & Investing
    • Risk Management & Portfolio Allocation
    • Strategies & Techniques
    • Fundamental Analysis & Research
    • Technical Analysis Tools & Indicators
  • Crypto News & Analysis
    • Bitcoin
    • Market Overview & Trends
    • Altcoins
    • Technical Analysis & Charting
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
  • Blockchain Technology
    • Supply Chain & Logistics Solutions
    • Enterprise Adoption & Applications
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives

Copyright © 2024 UnCirculars