Skip to main content

The UN has been hit by a major cyberattack

cybersecurity
(Image credit: Shutterstock)

The United Nations has admitted that malicious figures were able to breach its network earlier this year and steal data which could now be used for facilitating future attacks on the organization as well as on other agencies. 

“We can confirm that unknown attackers were able to breach parts of the United Nations infrastructure in April of 2021,” Stéphane Dujarric, spokesman for the UN Secretary-General, said in a statement. 

Dujarric added that the international body is a frequent target of cyberattacks, and also confirmed that it has been responding to other attacks linked to the earlier breach.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

Based on investigations carried out by the UN’s cybersecurity teams, the intruders made their way into the system on April 5, and there are indications that they were active inside the network at least till August 7.

Unsophisticated breach

Reporting on the development, Bloomberg believes that the intruders likely got in using the stolen login credentials of an UN employee purchased off the dark web.

“Initial access via credentials purchased from the dark web is now becoming standard modus operandi. So much so that we now have Initial Access Brokers (IABs) who specialize in just that and then sell off that access to other entities like ransomware affiliates or state sponsored groups,” Saumitra Das, CTO and cofounder, of security vendor Blue Hexagon tells TechRadar Pro.

Baber Amin, Chief Operating Officer, Veridium goes one step ahead and tells us that the UN breach is a good example of securing access using passwords alone.

“The best thing is to eliminate the use of passwords from as many systems as possible. If that is not possible, multi-factor authentication (MFA) should be implemented for all access,” suggests Amin.

Via Bloomberg

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.