Google’s warning, hackers are now sending threatened emails to the top officials of companies.
There is a big threat in the world of technology once again. Alphabet’s company Google has issued a warning that hackers are now targeting the top officials of the companies and sending threatened emails. These emails claim that hackers have stolen sensitive data from Oracle e-Business Suite and if companies do not give ransom, these data will be made public. The biggest concern is that these emails are said to be associated with the notorious Clop Rainmware Group, which has already carried out a large scale cyber attack.
What is the whole matter?
According to Google, hackers are sending emails to senior officers of several companies claiming that they have stolen financial and operational data from OraCle’s business application. However, Google has made it clear that there is no evidence yet whether the data is actually stolen. It may be that it is a strategy to scare companies only to recover money from them. Interestingly, Google has also not revealed how many companies or officers have become victims of these emails so far. That is, the situation is not completely clear at the moment, but it is certain that ransomware groups like Clop are constantly running new tricks and making corporate data a big weapon.
Why is this danger big?
Oracle’s e-business suite is used by large companies around the world to keep financial and operational data safe. In such a situation, if this data is leaked or claimed to be leaked, then companies may not only suffer heavy economic losses, but also have a profound impact on their brand value and reputation. Experts say that many times hackers do not have real data, but they just send emails for intimidation. Companies repay the ransom to save their credibility, which causes cyber criminals to get fresh and elevated.
How can it be avoided?
Google and cyber security experts have advised that companies should make their employees aware to protect them from fishing and spam email. In addition, regular checkup of network security, data encryption and multi-layer security protocol are necessary.
