A group of Cyber Threat Intelligence (CTI) experts, incident responders, and industry experts formed a CTI League to prevent or neutralize cyber threats at the time of COVID-19 pandemic. There has been a surge in cyberattacks on healthcare agencies that are fighting in curbing the spread of the COVID-19 pandemic.
The league members work to identify, analyze and neutralize all threats, especially the attacks against front-line medical resources and critical infrastructure of medical or health-related organizations.
The CTI League volunteers would help the medical sector with takedown, triage or escalate the relevant cyber attack, malicious activity or critic vulnerable to law enforcement agencies and the national computer emergency response teams (CERTs).
CTI experts will also help boost the cyber defense capabilities of various companies and train the employees on how to identify and thwart such attacks.
The league will help ensure hospitals and clinics protect their internal systems and databases for patients, healthcare workers, and volunteers. Reports claim that there has been a 150 percent increase in healthcare cyberattacks in the last two months, including phishing emails and ransomware.
Cybercriminals are using software vulnerabilities to launch ransomware attacks on healthcare facilities and demanding payments in cryptocurrencies such as Bitcoin to restore their systems back to normal. They are also distributing malware disguised as coronavirus-related health care products to steal personal information.
This international league spans more than 40 countries and consists of about 400 cybersecurity volunteers to counter hacking campaigns, including senior professionals from Microsoft, ClearSky Cyber Security, Okta and Amazon. This league is claimed by some to be a cyber version of the Justice League.
According to the CTI League, the goal of this platform is to foster a positive community, dedicated to sharing information and protecting end-users from COVID-19 cybersecurity threats. However, it is purely for threat intelligence work and not to be exploited as a for-profit resource.
Source: Read Full Article