Cyberattack! Think It Couldn’t Happen To You? Think Again!


Reading time ( words)

Cybersecurity is a necessity in every business, and this interview is a must-read for helping you and your company to understand vulnerabilities and protect yourself from attacks. Remember, until an attack hits you, you have no idea how devastating it can be.

Eric Cormier and Dave Ryder of Prototron address the ransomware attack that locked them out of their system last December, bringing business to a screeching halt and forcing them into the arduous process of a full rebuild. With things finally starting to normalize, Eric and Dave now offer precautionary advice they’ve accumulated over the past six months.

Barry Matties: Eric, to set up this conversation, your company was hit with ransomware. Somebody locked you out of your system and demanded a ransom.

Eric Cormier: Yes, and it was actually Friday the 13th in December 2019. It was not a good day. From what we’ve been able to trace, it came from a piece of equipment that we utilize for certain processes in the shop. It looks like somebody got onto the internet and accidentally clicked on some links.

With ransomware, what’s insane about it— especially what we were hit with—is that it was built to not only infiltrate our network, but also determine the types of PCs we had in the shop in order to do the most damage. It ran from one PC, hit a couple of devices that weren’t secure, and turned them into what they call “zombies,” which wreaked havoc across our facility. It originated in Redmond, and because our facilities are connected in Redmond and Tucson, it branched out and hit multiple PCs and infrastructure in our Tucson facility.

Because of the extent of how this software works and how advanced it was, we had to do a 50,000-foot view of shutting everything down and doing a complete rebuild. We couldn’t take what we had that was still working and reuse it. We had to reinstall operating systems and go the full length of a complete infrastructure rebuild. It did some serious damage. And it’s not necessarily something that can be controlled from a security perspective once it’s been let in-house; it was very difficult to root out where it came from.

With the nature of cybersecurity today, we had tools in place that allowed us to determine—from an intrusion detection perspective and traceability of what went outbound—that our data was compromised internally. We were able to even have a third party look at it, and they verified that as well. We had a third party review everything and found that nothing was compromised externally, which meant that while our data was affected, it wasn’t transferred out of our networks.

To read this entire interview, which appeared in the July 2020 issue of SMT007 Magazine, click here.

Share

Print


Suggested Items

Just Ask Happy: The Future of Mechanical Blind, Buried Vias

06/26/2020 | I-Connect007 Editorial Team
We asked for you to send in your questions for Happy Holden, and you took us up on it! The questions you've posed run the gamut, covering technology, the worldwide fab market, and everything in between. Enjoy.

Advantages of Using ZIF Connectors as a Termination Method

03/17/2020 | All Flex
There are many types of connectors and termination methods available when designing a flexible circuit. One of the most common is the zero insertion force (ZIF) connector. The reason why the ZIF connector is so popular is that they eliminate the requirement for an added connector. They create a direct connection from the circuit to the mating connector reducing overall weight and cost. Here are a few general facts about ZIF connectors.

Congratulations to Mike Carano! Dieter Bergman IPC Fellowship Award Recipient

03/09/2020 | Patty Goldman, I-Connect007
Patty Goldman spoke with Mike Carano about being awarded the Dieter Bergman IPC Fellowship Award, what that means to him as someone who was inspired by Dieter, and after 40 years in the industry, what keeps him excited going forward. Talking with Mike, one can feel his enthusiasm for IPC and the industry, which is contagious.



Copyright © 2020 I-Connect007. All rights reserved.