Cyber attacks cause many American businesses to return to using paper
CDK is a provider of professional support software such as sales, financial management, inventory, and office for most auto dealers in the US with about 15,000 customers.
AutoNation, one of the leading auto retailers in the US, in order to maintain business operations, they must use paperwork and process it manually. After the attack took place, their business operations were disrupted and negatively affected.
According to Jim Seavitt, owner of a car dealership in Michigan, CDK's problem makes the process of bringing cars to customers more laborious. They cannot use CDK's software to do the procedures, so nearly 100 cars sold in last week's sale are still "on hold" and cannot be shipped to customers.
CDK had to close its information technology system as well as data center to avoid spreading after being attacked continuously for two days June 19-20. CDK has sent a notification to partners indicating that the restoration process has begun and is expected to take several days to complete.
The cybercriminal group BlackSuit was once famous for its reckless attacks on government agencies, confronting Anonymous who was believed to be behind the incident. This hacker group disbanded in May 2022. The hacker group is said to demand a ransom of millions of dollars to end the attack.
You should read it
- What to do when detecting hackers attack websites?
- This critical vulnerability turns home devices into attack tools
- What is 51% attack? How does 51% attack work?
- Microsoft was attacked by Syrian Electronic Arm
- Mexico's largest oil and gas corporation has been attacked by ransomware, presenting a cyber security disaster
- Apple introduced an update page of the error recovery process
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- What is a Replay Attack?
May be interested
- What is Incident Response Retainer (IRR)?all businesses face cyber attacks. when successful, they not only cause disruption, but also allow cybercriminals to steal personal information, which can harm both businesses and their customers.
- Endpoint security - The inevitable trend of security on cyberspaceas cyber attacks are becoming more and more serious both in number and size, businesses are also becoming increasingly aware of the need for more comprehensive and advanced security solutions.
- What can organizations do to protect themselves from cyber attacks?the devastation, the losses of billions of dollars are caused by cyber attacks that are increasingly expanding around the world in terms of scale, manner and extent of danger.
- Microsoft successfully prevented nearly 71 billion cyber attacks in 2021according to microsoft's internal statistics, in 2021, the company has successfully prevented and neutralized nearly 71 billion cyber attacks.
- Hackers attacked hundreds of universities to gain access to library datacobalt dickens is one of the world's most sought after hacker groups.
- Common types of cyber attacks target seniorscybercrime targeting the elderly is a major problem worldwide. there are many reasons for this group to fall victim to online fraud. the majority of the elderly access technology era slower than young people
- Warning: DDoS attacks are becoming more dangerous both in scale and complexityalthough ddos is a new form of attack, it is always considered as a leading threat to organizations and businesses worldwide.
- Surprise with a paper engine that still works wellyou will have to roll your eyes in shock when you see these engines run and know that they are made entirely of paper.
- What are Volumetric Attacks? How to Detect and Prevent Them Effectivelyvolumetric attacks are a type of cyber attack that falls under the category of ddos (distributed denial of service). attackers will send large amounts of unwanted data to a specific target in order to overload that system.
- Defeat China's largest hacker training furnacechinese police have closed the website to recruit thousands of members and provide training on cyber attacks and malicious code.