Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
It’s bad enough when ransomware infects an individual’s PC or smartphone. Not having access to locally stored files can really throw a wrench in the works of a person’s life. But when it comes to consumer ransomware, usually only one person is inconvenienced per infection.
We know that ransomware attacks enterprise systems too. Public services in particular are a juicy target for cyber attackers deploying ransomware. Ransomware can be really destructive to embedded/IoT devices because they’re computers inside appliances and machines that have practical use in everyday life – refrigerators, MRI scanners, you-name-it. But also systems that municipalities use to support the lives of their citizens are deployed on more conventional types of computers – desktop, servers, and cloud instances. When ransomware impacts municipal computer networks, the effects can get ugly.
On July 23rd, Matanuska-Susitna, a borough near Anchorage, Alaska, ground to a halt. Valdez, Alaska was affected as well.
“The cyber attack has caused major disruption in Borough services and loss of productivity, which may continue for a prolonged time,” said Matanuska-Susitna politician Ted Leonard.
Computer systems supporting libraries, swimming pools, e-commerce, the local landfill, animal care, and collections all ceased functionality.
From Matanuska-Susitna IT Director Eric Wyatt’s report:
“Almost all Windows based production servers have been encrypted, this includes our domain,email (Exchange), Govern, Logos, TRIM, SharePoint (intranet and eCommerce), GIS, SQLdatabases, S:\ drive files shares ( L:\, M:\, P:\ ) and even our backup and Disaster Recovery(DR) servers.
The backup and DR servers had been engineered in a way that no known threats would affect.This new threat has always been considered a theoretical exploit. To date, neither our local network engineering consultant nor the international vendors: Cisco, Dell, Commvault, that theyrepresent, have seen this exploit developed and used. Further, our backup and DR model uses
a multi-tiered approach to data protection, which appears to have saved some portion of ourdata, even under this sophisticated attack.
The phone system (Mitel) was encrypted, we lost some functionality but most direct lines continued to work as long as the phone was powered on.
The door lock card swipe system (Lenel) has also been encrypted but will continue to function in the last known good condition.
Though it initially appeared that our data was a complete loss, we have recently recovered data from the shared drives, Logos, Govern, TRIM, GIS and more.
eMail (Exchange) does appear to be completely unrecoverable.”
Completely unrecoverable… ouch. Matanuska-Susitna workers had to do their jobs with hand receipts and typewriters. The last time I saw a typewriter in use was during my 1980s early childhood, and even that was an electronic Smith Corona model with a bright green monitor, not a mechanical wonder from the early 20th century. What kind of typewriters did they have to use?
The attack was deployed with BitPaymer ransomware, the Emotet Trojan, and a human cyber attacker directly penetrating Matanuska-Susitna’s networks. The exploits leveraged zero day vulnerabilities but used familiar components. BitPaymer may have been on the Borough’s computers as early as May 3rd. But the encryption timebomb was dated for July 23rd.
BitPaymer ransomware was behind an attack on Scottish hospitals in August 2017, about a year ago.
Atlanta, Georgia can sympathize with Matanuska-Susitna. Back in March of this year, their networks were hit by SamSam, a ransomware strain that impacted Indiana’s Hancock Health in January. Among the functions stopped in Atlanta’s SamSam attack were utility billing systems, police and city worker reporting, parking ticket payment, sewer infrastructure requests, and the digital backbone of the city’s courts of law.
According to a confidential report covered by the Atlanta Journal-Constitution on August 1st, the incident response to March’s SamSam attack could end up costing the city $17 million. That figure doesn’t include speculative losses from the downtime of Atlanta’s computer systems, just fixing the damage done. Apparently Atlanta’s computers hadn’t been security patched for months.
Ransomware Protection Software
Tags: Ransomware attacks
Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks, many companies today are looking for greater protection of their decentralized computing work environments from their Managed Service Providers (MSPs). As a result, MSPs need to deliver firewall solutions that are designed…
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is increasingly true for EU member states and the organizations that are based in or operate from these countries. The number of cyber-attacks targeting EU member states has risen. The…
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as that of a pandemic. This means that a building doesn’t necessarily have to be demolished or lives have to be lost for an unforeseen event to completely…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP