Researchers find massive spike in infected enterprises worldwide.
Turns out that many organizations worldwide have unknowingly sent employees to work from home with already-infected endpoint devices during the COVID-19 crisis.
New findings from security firms Arctic Security and Team Cymru show that some 50,000 US organizations had infected devices that have been moved from the relative safety of the corporate network to home networks in the rush to empty offices amid the pandemic.
"Our analysis indicates that the employees' computers were already hacked before COVID-19 made the news, but were lying dormant behind firewalls, blocking their ability to go to work on behalf of the threat actors," Lari Huttunen, senior analyst at Finland-based Arctic Security, said in a statement. "Now those zombies are outside firewalls, connected to their corporate networks via VPNs, which were not designed to prevent malicious communications."
Overall, the number of compromised organizations in Europe and US has more than doubled between January and March, the researchers said.
A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024