Contents:
The International Criminal Court (ICC) announced on September 19th that hackers breached their computer systems.
ICC storages highly sensitive information about war crimes and is thus one of the world`s most important public institutions.
What We Know About the ICC System Breach
Tuesday afternoon ICC disclosed that last week they detected anomalous activity on their network. The investigation is ongoing, so they did not give any other details about the impact or method of the cyberattack. For the moment, it remains unclear how the adversaries succeeded in penetrating ICC`s network. Additionally, the institution disclosed no details regarding whether the attackers managed to compromise or exfiltrate their data.
According to their spokesman, System Administrators took the necessary security measures to contain the attack and plans to bolster the defense.
Looking forward, the Court will be building on existing work presently underway to strengthen its cyber security framework, including accelerating its use of cloud technology.
Statement of the #ICC Spokesperson on recent cybersecurity incident ⤵️ pic.twitter.com/CkPPuoaSHm
— Int’l Criminal Court (@IntlCrimCourt) September 19, 2023
Why Is the International Criminal Court a Target for Hackers?
The ICC investigates and prosecutes crimes that impact the international community. Such offenses are war crimes, crimes against humanity, and genocides.
So, the Court`s activities usually involve investigating preeminent politicians, businessmen, and other powerful individuals. This makes it an interesting target for cyberespionage and state-sponsored threat groups.
One of the ICC`s most recent notorious actions is issuing an arrest warrant for Vladimir Putin due to the crimes that followed Russia’s invading Ukraine.
Heimdal® Network DNS Security
- No need to deploy it on your endpoints;
- Protects any entry point into the organization, including BYODs;
- Stops even hidden threats using AI and your network traffic log;
- Complete DNS, HTTP and HTTPs protection, HIPS and HIDS;
Network Protection Recommendations from Heimdal`s Security Specialists
Maintaining confidentiality, integrity and availability of data is any Security Administrator`s goal. It`s not an easy task, especially when you deal with state backed hackers. Yet there are several powerful security measures that any organization could benefit from.
Follow Heimdal`s recommendations to prevent a network breach and data loss. Use a managed threat hunting solutionv and enforce network security best practices to protect your digital environment:
- Make sure all software on all endpoints is up to date and that there are no unpatched old devices that connect to the network. An automated patch management solution solves the problem fast and effective.
- Prevent any malicious connection that might occur by DNS layer security. Use AI and machine-learning to detect and block unknown malicious domains. Hackers use Domain Generation Algorithms to evade blacklist-based detection. So, you can outsmart them by using a solution like Heimdal`s DNS Security Network. Detect and block malicious communication to phishing links, harmful websites and C2s on the spot.
- Enforce Zero Trust Network Access (ZTNA). Although it obviously brings many benefits, cloud computing also comes with risks. ZTNA makes secure remote access to corporate resources possible. Users can access software, data, and services based on strict access control policies instead of broad network privileges.
- Use end-to-end encryption for the sensitive data you want to protect. If hackers eventually succeed to breach your system and exfiltrate data, they won`t be able to use it.
If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.