launches solution to mitigate hardware cyberattacks

Must Read

How to choose an effective DDoS mitigation plan

There are several flavours from which to choose when selecting an effective DDoS mitigation strategy. Most enterprises opt for one of the cloud protection flavours (always-on or on-demand)

How tech bolster security of online gaming platforms

The rise of and is evident throughout the world’s financial capitals with the UK, US, and a few other European nations at the forefront

Explained: The evolving nature of cybersecurity threats

Concerns such as hacking and the presence of computer viruses have existed for decades in one form or another. As technology evolved over the years, so did the cybersecurity  threats themselves.

has introduced a software solution which it says will offer comprehensive mitigation of hardware-based cyberattacks. The new solution promise to mitigate and protect against manipulated peripherals, transparent network devices, and firmware vulnerabilities.

“These attacks are just the ‘tip of the iceberg’ as most remain undisclosed.”, said Yossi Appleboum, CEO of Sepio Systems Inc. “In many cases, hitting an organization is as simple as replacing a trusted peripheral with a manipulated one. For example, we discovered multiple Raspberry Pi computer modules, that include connectivity, implanted in keyboards that were used for exfiltration attacks. The implant was emulating keyboard keystrokes to infect the workstation and steal data and was running undetected before Sepio’s RDM was deployed.”

In another incident, an off-the-shelf network router was used for infiltrating a Tier 1 bank. This tiny device was plugged in-line between a printer and the enterprise network, allowing covert remote access into the bank’s IT systems. Sepio’s software was able to trace this rogue device based on its physical fingerprint.

“Manipulated devices, intentionally used by insiders or socially engineered employees, are causing significant damages. We also witness an increasing number of penetrated uncontrolled supply chains that deliver infected equipment.” said Appleboum. “While companies were focused on their software cyber risks, they overlooked the threat coming from their hardware. Users can not install unregulated software on a corporate computer but can easily connect an uncontrolled hardware accessory.”

Sepio said that its solution has been deployed in over 20 mid to large banks, insurance, and telecom companies in the U.S., Singapore, Brazil, and Israel. The current install base secures over 600,000 workstations and network ports.

Rogue device cyber-attacks are rapidly growing as demonstrated by recent reports of European banks losing tens of millions of dollars after hackers implanted hardware attack tools that compromised the secured infrastructure.

Subscribe to receive the day's headlines from Tech Observer straight in your inbox

Leave a Reply

*The moderation of comments is automated and not cleared manually by techobserver.in. Embedding of any link and use of abusive or unparliamentary language are prohibited.
- Advertisement -

Latest in TECH

Sapience Analytics signs distribution agreement with Redington

Sapience Analytics and Redington said that they have entered into a distribution agreement where latter will resell the Sapience Vue solution through its network of over 30,000 channel partners, system integrators, and value-added resellers countrywide.
- Advertisement -SAP Hana

Related Articles