{"id":17660,"date":"2022-04-18T10:14:00","date_gmt":"2022-04-18T10:14:00","guid":{"rendered":"https:\/\/www.cyberguru.it\/?p=17660"},"modified":"2023-04-07T14:47:10","modified_gmt":"2023-04-07T14:47:10","slug":"supply-chain-a-70-million-ransomware-attack","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/","title":{"rendered":"Supply Chain: a $70 million ransomware attack"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>Cyber attacks incidents on supply chains are unfortunately becoming very common. In recent years, these attacks have not only increased in number but have become more dangerous in terms of consequences. The interest of cyber crime in this type of attack is growing enormously. The most recent analysis shows an increase of 400% only in the past year.<\/p>\n<\/p>\n<p>Undoubtedly, supply chains can be considered a relevant and important part of the business operations of many organisations. However, the ability to provide certain services to a vast network provides hackers with many possible weaknesses to attack.<\/p>\n<\/p>\n<p>In recent years, large organisations have made significant investments to strengthen their IT security. This has forced many hackers to look for more creative ways to hit their targets. The supply chain has therefore become an interesting opportunity to breach all organisations that use it, regardless of their size.<\/p>\n<\/p>\n<p>The latest scams have shown that it takes just one to a single application of a &#8216;leading&#8217; supplier to cause enormous damage throughout the supply chain.<\/p>\n<\/p>\n<h2><strong>Supply chain: $70 million is the latest ransom demanded<\/strong><\/h2>\n<\/p>\n<p>A few days ago, the latest REvil ransomware attack hit the US-based Kaseya, a leading provider of IT support to hundreds of companies worldwide, including the Coop supermarket chain in Sweden. Its software is mostly used by remote monitoring and management service providers, who use it to offer the same service to other companies.<\/p>\n<\/p>\n<p>By targeting the IT systems of the company Kaseya, hackers from the Russian group REvil were able to shut down the systems of various retailers, as well as those of hundreds of the customers like Coop who used the software.<\/p>\n<\/p>\n<p>The ransomware blocked the computer systems, encrypting data in the management systems and thus paralysing all activities. Coop Sweden itself was forced to close hundreds of its supermarkets.<\/p>\n<\/p>\n<p>It is now clear that cyber crime continues to evolve its attack strategies. This latest ransomware attack is proof of that. Supply chains have become extremely desirable prey because they can open doors to reach many customers and increase possible profits.<\/p>\n<\/p>\n<h2><strong>What can be done to prevent this type of attack?<\/strong><\/h2>\n<\/p>\n<h3>Assess supply chain security policies<\/h3>\n<\/p>\n<p>Check all security practices, not only those of a technological nature, implemented by service providers. This will allow you to highlight any potential supply chain risks and understand what controls and processes you need to implement to respond quickly and effectively to a breach.<\/p>\n<\/p>\n<h3><strong>Identify areas for improvement<\/strong><\/h3>\n<\/p>\n<p>Hackers are becoming more creative in their attempts to compromise supply chains, but a large number of incidents are still due to credential theft or exploitation of software vulnerabilities. By improving the digital knowledge of the entire organisation with Cyber Security Awareness training, all risks related to inappropriate human behaviour can be mitigated.<\/p>\n<\/p>\n<h3><strong>Effective Cyber Security Awareness training programmes<\/strong><\/h3>\n<\/p>\n<p>Clearly the human factor is still the decisive element in the defence of any organisation. Investing in an effective Cyber Security Awareness training programme must therefore involve all stakeholders. In order to recognise threats and react quickly in the event of an attack, every organisation must involve all staff in training programmes that follow effective methodologies. Programmes that provide all the necessary elements to create a solid defensive barrier.<a href=\"https:\/\/www.cyberguru.it\/cyber-guru-channel\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><\/strong><\/a><\/p>\n<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attacks incidents on supply chains are unfortunately becoming very common. In recent years, these attacks have not only increased in number but have become more dangerous in terms of consequences. The interest of cyber crime in this type of attack is growing enormously. The most recent analysis shows an increase of 400% only in [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":17661,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:paragraph -->\n<p>Cyber attacks incidents on supply chains are unfortunately becoming very common. In recent years, these attacks have not only increased in number but have become more dangerous in terms of consequences. The interest of cyber crime in this type of attack is growing enormously. The most recent analysis shows an increase of 400% only in the past year.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Undoubtedly, supply chains can be considered a relevant and important part of the business operations of many organisations. However, the ability to provide certain services to a vast network provides hackers with many possible weaknesses to attack.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In recent years, large organisations have made significant investments to strengthen their IT security. This has forced many hackers to look for more creative ways to hit their targets. The supply chain has therefore become an interesting opportunity to breach all organisations that use it, regardless of their size.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The latest scams have shown that it takes just one to a single application of a 'leading' supplier to cause enormous damage throughout the supply chain.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading -->\n<h2><strong>Supply chain: $70 million is the latest ransom demanded<\/strong><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>A few days ago, the latest REvil ransomware attack hit the US-based Kaseya, a leading provider of IT support to hundreds of companies worldwide, including the Coop supermarket chain in Sweden. Its software is mostly used by remote monitoring and management service providers, who use it to offer the same service to other companies.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>By targeting the IT systems of the company Kaseya, hackers from the Russian group REvil were able to shut down the systems of various retailers, as well as those of hundreds of the customers like Coop who used the software.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The ransomware blocked the computer systems, encrypting data in the management systems and thus paralysing all activities. Coop Sweden itself was forced to close hundreds of its supermarkets.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>It is now clear that cyber crime continues to evolve its attack strategies. This latest ransomware attack is proof of that. Supply chains have become extremely desirable prey because they can open doors to reach many customers and increase possible profits.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading -->\n<h2><strong>What can be done to prevent this type of attack?<\/strong><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>Assess supply chain security policies<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Check all security practices, not only those of a technological nature, implemented by service providers. This will allow you to highlight any potential supply chain risks and understand what controls and processes you need to implement to respond quickly and effectively to a breach.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3><strong>Identify areas for improvement<\/strong><\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Hackers are becoming more creative in their attempts to compromise supply chains, but a large number of incidents are still due to credential theft or exploitation of software vulnerabilities. By improving the digital knowledge of the entire organisation with Cyber Security Awareness training, all risks related to inappropriate human behaviour can be mitigated.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3><strong>Effective Cyber Security Awareness training programmes<\/strong><\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Clearly the human factor is still the decisive element in the defence of any organisation. Investing in an effective Cyber Security Awareness training programme must therefore involve all stakeholders. In order to recognise threats and react quickly in the event of an attack, every organisation must involve all staff in training programmes that follow effective methodologies. Programmes that provide all the necessary elements to create a solid defensive barrier.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:group {\"backgroundColor\":\"very-light-gray\"} -->\n<div class=\"wp-block-group has-very-light-gray-background-color has-background\"><!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a rel=\"noreferrer noopener\" aria-label=\" (apre in una nuova scheda)\" href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/\" target=\"_blank\"><strong>Per saperne di pi\u00f9 sui percorsi formativi di Cyber Guru Awareness<\/strong><\/a><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"> <a href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/cyber-guru-phishing\/\"><strong>Per saperne di pi\u00f9 sulla piattaforma di  Cyber Guru Phishing<\/strong><\/a>  <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a href=\"https:\/\/www.cyberguru.it\/cyber-guru-channel\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Per saperne di pi\u00f9 sulla piattaforma di  Cyber Guru Channel<\/strong><\/a><\/p>\n<!-- \/wp:paragraph --><\/div>\n<!-- \/wp:group -->","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[470,480,482],"class_list":["post-17660","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","tag-cyber-security-awareness-en-3","tag-cyber-training-2","tag-supply-chain-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Supply Chain: a $70 million ransomware attack<\/title>\n<meta name=\"description\" content=\"Cyber crime keeps renewing its attacking techniques. The latest goal of ransomware is to hit the always more common supply chains!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supply Chain: a $70 million ransomware attack\" \/>\n<meta property=\"og:description\" content=\"Cyber crime keeps renewing its attacking techniques. The latest goal of ransomware is to hit the always more common supply chains!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-18T10:14:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-07T14:47:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Supply-chain.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"290\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Cyber Guru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber Guru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/\"},\"author\":{\"name\":\"Cyber Guru\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/7ee941e099c92eb9ea57fceee4ec4736\"},\"headline\":\"Supply Chain: a $70 million ransomware attack\",\"datePublished\":\"2022-04-18T10:14:00+00:00\",\"dateModified\":\"2023-04-07T14:47:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/\"},\"wordCount\":638,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Supply-chain.webp\",\"keywords\":[\"Cyber Security Awareness\",\"Cyber training\",\"supply chain\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/\",\"name\":\"Supply Chain: a $70 million ransomware attack\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Supply-chain.webp\",\"datePublished\":\"2022-04-18T10:14:00+00:00\",\"dateModified\":\"2023-04-07T14:47:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/7ee941e099c92eb9ea57fceee4ec4736\"},\"description\":\"Cyber crime keeps renewing its attacking techniques. The latest goal of ransomware is to hit the always more common supply chains!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Supply-chain.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Supply-chain.webp\",\"width\":500,\"height\":290,\"caption\":\"supply chain\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/18\\\/supply-chain-a-70-million-ransomware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supply Chain: a $70 million ransomware attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/7ee941e099c92eb9ea57fceee4ec4736\",\"name\":\"Cyber Guru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g\",\"caption\":\"Cyber Guru\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/cyber-guru\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Supply Chain: a $70 million ransomware attack","description":"Cyber crime keeps renewing its attacking techniques. The latest goal of ransomware is to hit the always more common supply chains!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/","og_locale":"en_US","og_type":"article","og_title":"Supply Chain: a $70 million ransomware attack","og_description":"Cyber crime keeps renewing its attacking techniques. The latest goal of ransomware is to hit the always more common supply chains!","og_url":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2022-04-18T10:14:00+00:00","article_modified_time":"2023-04-07T14:47:10+00:00","og_image":[{"width":500,"height":290,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Supply-chain.webp","type":"image\/webp"}],"author":"Cyber Guru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber Guru","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/"},"author":{"name":"Cyber Guru","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/7ee941e099c92eb9ea57fceee4ec4736"},"headline":"Supply Chain: a $70 million ransomware attack","datePublished":"2022-04-18T10:14:00+00:00","dateModified":"2023-04-07T14:47:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/"},"wordCount":638,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Supply-chain.webp","keywords":["Cyber Security Awareness","Cyber training","supply chain"],"articleSection":["Security Awareness"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/","url":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/","name":"Supply Chain: a $70 million ransomware attack","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Supply-chain.webp","datePublished":"2022-04-18T10:14:00+00:00","dateModified":"2023-04-07T14:47:10+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/7ee941e099c92eb9ea57fceee4ec4736"},"description":"Cyber crime keeps renewing its attacking techniques. The latest goal of ransomware is to hit the always more common supply chains!","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Supply-chain.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Supply-chain.webp","width":500,"height":290,"caption":"supply chain"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/18\/supply-chain-a-70-million-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Supply Chain: a $70 million ransomware attack"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/7ee941e099c92eb9ea57fceee4ec4736","name":"Cyber Guru","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g","caption":"Cyber Guru"},"url":"https:\/\/www.cyberguru.it\/en\/author\/cyber-guru\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/17660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=17660"}],"version-history":[{"count":4,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/17660\/revisions"}],"predecessor-version":[{"id":29816,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/17660\/revisions\/29816"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/17661"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=17660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=17660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=17660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}