The more wired and connected our world becomes — the more it is susceptible to malicious hackers.
It has been discovered that connected devices such as MRI machines are just as open to hackers and malware as any other device. By implementing a Trojan horse into a system the hackers are able to gain access. How do they get the Trojan horse on the system? Usually by human error – opening email attachments, inserting USB drives of questionable origin, etc.
From the article:
“.. then collects some basic information about the compromised computers and send it to the attackers to a remote command-and-control server, using which the group determines whether the hacked system is used by a researcher or a high-value target.
…If the victim is of interest, the malware then “aggressively” spread itself across open network shares to infect other computers within the same organisation.”
Moral of the story: If you don’t know what it is, don’t click on it!
Categories: Smoke and Mirrors