A few days ago the servers that host the information of the International Committee of the Red Cross (ICRC) were the target of a cyberattack that compromised the confidential information of more than 500,000 people in vulnerable conditions, including migrants, victims of natural disasters, relatives of missing persons and prisoners around the world, impacting at least 60 divisions of the international organization.
The Red Cross and Red Crescent consider it a priority to address this security issue, as public disclosure of data exposed during the incident could put those affected at risk.
ICRC Director General Robert Mardini said: “We are appalled and perplexed to learn that this information, stored for humanitarian aid purposes, could be attacked and compromised.” Mardini stressed that the attack puts thousands of vulnerable people at risk.
At the moment details such as the identity of those responsible for the attack or the malware variant used are unknown, since it is only known that the attack was specifically directed against a technology firm based in Switzerland, a contractor of the Red Cross. There have also been no indications of malicious use or leakage of the compromised data.
This leak would mainly affect the Restoring Family Links program, with which the Red Cross seeks to help displaced people from their places of origin to find their relatives. Due to this cyberattack, the organization had to disconnect the systems associated with the program, without being able to propose a tentative date for its restoration; Mardini assures that the organizations will continue working to find a solution as soon as possible.
The official concluded by recalling the importance of carrying out these initiatives: “Every day, the Red Cross and Red Crescent help reunite an average of 12 missing people with their families. Cyber attacks like this jeopardize that essential work, so the incident needs to be seriously analyzed,” Mardini concludes.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.

source

You May Also Like

Did Facebook’s business model make the company an easier target for cybercriminals?

Facebook co-founder, Chairman and CEO Mark Zuckerberg arrives to testify before the…

Facebook sues hacker who stole information from its users to sell it on illegal forums

A few days ago Facebook filed a lawsuit against Alexandrovich Solonchenko, a…

Massive cyberattack on European satellites shuts down Internet across Europe

Thousands of people in France experienced difficulties accessing the Internet due to…

How $2.2 million worth of Bored Ape Yacht Club NFTs were stolen from OpenSea?

Renowned non-fungible token (NFT) collector Todd Kramer revealed that his collection of…