Faegre Drinker on Law and Technology Podcast: The Growth and Evolution of Disruptionware

Share

Cyberattacks are an increasingly common presence in the news, and disruptionware has emerged as a popular — and particularly nefarious — type of attack. Disruptionware poses an especially troubling threat, because it attacks both an organization’s information technology and operational technology networks — often with highly destructive goals. In this episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss sits down with Peter Baldwin to break down disruptionware attacks, the industries that are most susceptible to them, and what we can learn from high-profile incidents.

Continue reading “Faegre Drinker on Law and Technology Podcast: The Growth and Evolution of Disruptionware”

Faegre Drinker on Law and Technology Podcast: How To Use Data Analytics in Your Investigation

Share

When responding to a high-pressure cyber incident, a strong data analytics team is invaluable — and can almost allow attorneys to see into the future. In this episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss sits down with Jay Brudz, partner at Faegre Drinker and Tritura managing executive director, and Kenny Darrell, Tritura senior data scientist, to discuss the use of data analytics in investigations.

Continue reading “Faegre Drinker on Law and Technology Podcast: How To Use Data Analytics in Your Investigation”

Disruptionware VII: The Evolution of Disruptionware and the Growth of Ransomware as a Service (RaaS)

Share

I have written multiple times about the danger of disruptionware to both Information Technology (IT) networks as well as Operational Technologies (OT) networks of victims globally. As discussed here, many different nefarious tools make up the disruptionware “tool kit.” These tools include, but are not limited to:

  • Ransomware
  • Wipers
  • Bricking capabilities tools
  • Automated components
  • Data exfiltration tools
  • Network reconnaissance tools

The most well-known and most used of all these tools is ransomware malware. Ransomware attacks have grown exponentially over the past few years. Dozens of ransomware gangs are launching ransomware attacks and terrorizing and extorting businesses throughout the world. This has included specific attacks against the U.S. energy sector as well as U.S. infrastructure projects.

Continue reading “Disruptionware VII: The Evolution of Disruptionware and the Growth of Ransomware as a Service (RaaS)”

Senators Introduce Bipartisan Legislation To Require Federal Contractors and Operators of Critical Infrastructure to Disclose Cyber Intrusions

Share

A bipartisan group of 14 United States senators recently introduced proposed legislation that would require federal contractors and operators of critical infrastructure to disclose any cyber intrusion within 24 hours. A copy of the proposed legislation can be found here.

Currently, there is no federally mandated reporting requirement for cyberattacks on American infrastructure targets. The newly proposed legislation is designed to prevent these attacks from going unreported and uninvestigated.

Continue reading “Senators Introduce Bipartisan Legislation To Require Federal Contractors and Operators of Critical Infrastructure to Disclose Cyber Intrusions”

Faegre Drinker on Law and Technology Podcast: Practical Tips To Keep Phishing Attacks at Bay

Share

Phishing attacks are simple, widely used and highly effective — and they can be devastating to the people and organizations they target. In this episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss sits down with Art Ehuan, vice president of Palo Alto Networks, and Chris Holden, chief information security officer at Crum & Forster, to discuss practices and defense strategies to keep phishing attacks at bay.

Continue reading “Faegre Drinker on Law and Technology Podcast: Practical Tips To Keep Phishing Attacks at Bay”