Immediately after the electronic attack, a group of a telegram called the lapsus $ scattered lapsus, Responsibility claim For penetration. The group’s name indicates Spiderand Lapsus $And The brilliant huntersThese have been behind some prominent electronic attacks in recent years. Often it consists of Young people, English speakers, Internet criminals targeting major companies.
The construction of vehicles is a very complex process. Hundreds of different companies provide spare parts, materials, electronics and more for vehicle manufacturers, and these wide supply chain networks Often dependence on “Just in time” manufacturing. This means that they are asking the parts and services that are delivered in specific quantities required and when they need them exactly – it is unlikely that car makers are kept by car makers.
Both suppliers that provide these manufacturing factories, all of which have been prepared for efficiency – economic efficiency, as well as logistical efficiency, says. Siraj Ahmed SheikhProfessor of Systems Security at Swansea University. “There is a very careful supply chain”, “says Sheikh, who talks about car manufacturing in general, adds about car manufacturing. “There is a decisive dependency for those suppliers who provide in this type of operation. Once there is a disruption in this type of facility, all suppliers are affected.”
One of the companies that make Glass Sun Roofs began to put workers, according to a report in Telegraph. At the same time, another company was told BBC About 40 people have been demobilized so far. French auto company OpmobilityAnd that employ 38,000 people in 150 sites, tell WIRED that he is making some changes and monitoring events. “Opmobility is reinforcing its production in certain locations as a result of closing its production by one of its customers in the United Kingdom and depending on the development of the situation,” says a company spokesman.
Although it is unclear, i.e. the specific JLR systems affected by the infiltrators and what systems that JLR took inaccurately undelisible, many of them are likely to be in a non -contact mode to prevent the attack from getting worse. “It is very difficult to ensure containment while you still have contacts between different systems,” he says. Orla CoxThe head of cybersecurity in Europe, the Middle East and Africa at FTI Consulting, which responds to electronic attacks and business in investigations. “Often times, there will be dependency on different systems: you go down, then it means that it has an effect on another.”
Whenever there is a penetration in any part of the supply chain – whether the manufacturer is at the top of the pyramid or another company below the pipeline – contacts between companies may be cut to prevent attackers from spreading from one network to another. Cox says that connections may be stopped via VPNS or application programming facades. “Some people may take stronger measures such as banning fields and IP addresses. Then things like email are no longer used between the two organizers.”
The complexity of digital and material supply chains, which extend across dozens of companies and production systems in a timely manner, means that it is likely to restore everything over the Internet and even full work speed may take time. Maccoll, a Rusi researcher, says cybersecurity issues often fail to discuss them at the highest level of British policy – but this time it can be different due to the size of the turmoil. “This incident has the ability to reduce due to job losses and the fact that the deputies in the electoral districts affected by this will get calls,” he says. This penetration has already started.
https://media.wired.com/photos/68cc38742f579b2151ce2616/191:100/w_1280,c_limit/jaguar-hack-sec-1953409218.jpg
Source link