Log in
E-mail
Password
Show password
Remember
Forgot password ?
Become a member for free
Sign up
Sign up
New member
Sign up for FREE
New customer
Discover our services
Settings
Settings
Dynamic quotes 
OFFON
  1. Homepage
  2. Equities
  3. Sweden
  4. Nasdaq Stockholm
  5. Clavister Holding AB (publ.)
  6. News
  7. Summary
    CLAV   SE0005308558

CLAVISTER HOLDING AB (PUBL.)

(CLAV)
  Report
SummaryQuotesChartsNewsRatingsCalendarCompanyFinancialsConsensusRevisions 
SummaryMost relevantAll NewsOther languagesPress ReleasesOfficial PublicationsSector news

Another day, another data leak: Fortinet and the security lessons learned

11/24/2021 | 04:00am EST

In September this year, network security solutions provider Fortinet, suffered a data leak which exposed VPN login names and passwords. The exact number of credentials isn't known. Fortinet said in a blog post that 87,000 had been impacted, while publication Bleeping Computer put the number at half a million.

According to Fortinet, the credentials were obtained from systems that remain unpatched against FG-IR-18-384 / CVE-2018-13379 - a bug uncovered in 2018 which is now on the Cybersecurity and Infrastructure Security Agency's (CISA's) list of the top 30 most-exploited flaws. Fortinet released a patch in 2019, but even if devices were patched at the time, if passwords weren't updated, they remined vulnerable.

The business of PR

The credentials were published by a threat actor known as 'Orange' who is the administrator of the newly launched RAMP hacking forum (believed to be a representative of the new Groove ransomware operation) and a previous operator of the Babuk Ransomware operation. In other words, a pretty formidable cybercriminal.

With the credentials being leaked for free, by some, the move was seen as an attempt for the new group to boost awareness of itself. In other words, criminal gangs are partaking in PR. And Groove didn't stop there, in another effort to raise its profile and cause alarm, just last month, the gang published a Russian blog calling on all other ransomware operations to target the US.

Lucky escape

As well as the Fortinet breach being a possible publicity stunt, it was also a genuine cyber-attack that had the potential to cause a lot of damage. A major risk is that the credentials could be used to access corporate VPNs and, therefore, networks, to exfiltrate data, launch ransomware or other malware and other disruptive activities.

In particular, events from the past year have demonstrated the chaos that can ensue if an organisation falls victim to a ransomware attack. Indeed, 2021 has seen two particularly devastating events - the Colonial Pipeline and JBS (the global meatpacking company). Ransomware shut down both companies' operational capacity, leaving lasting implications such as shortages and rising prices. What's more, a staggering amount of money was handed over - the bosses of each organisation paid $4.4 million and $11 million respectively, proving just how critical robust cybersecurity measures can be.

Together we are stronger

Luckily, the consequences following the Fortinet data breach weren't quite so disastrous, however, even months on, the breach should be a wake-up call to all those in the industry. What can we learn from this? It's important for vendors to share treats, breaches, patches and such, because together are we stronger.

Sharing threat intelligence could help mitigation of cyber threats. It reduces duplication of effort and allows one vendor's detection to become another organisations prevention. Indeed, the European Union Agency for Cybersecurity (enisa) states 'information sharing between is an important aspect for cyber security.' With this in mind, Clavister adheres to enisa's best practices for knowledge sharing.

Protect your data at all costs

Even with sharing of threat intelligence though, any breach involving a security vendor will always be concerning given the company is entrusted to protect data. It highlights where vulnerabilities can exist within security setups and shows how important it is to be able to trust your cybersecurity provider.

Vendors have a duty to regularly patch their products and leverage their knowledge and insight of cyberattacks and techniques to ensure their offerings aren't vulnerable. Fortinet was breached just one month prior to the September incident, indicating that despite knowing the vulnerabilities, they found it difficult to patch all affected devices. There's no doubt that cybercriminals are stealthy but, at Clavister, we are dedicated to ensuring nothing like this ever happens to our customers.

That said, a cybersecurity strategy requires input from customers too. Good security posture takes more than simply investing in solutions, it requires ongoing management - such as a patching and regular password refreshes. As part of this, a cybersecurity strategy ought to consider the three crucial elements outlined in our blog: the challenges of remote working, European security for European businesses and, finally, having the correct training in place for staff.

The news of the Fortinet breach, coupled with the fact that 68% of business leaders feel their cybersecurity risks are increasing, shows the power cybercriminals have, and their ability outsmart even some vendors. Ultimately, companies of all shapes and sizes need to wake up to the very real possibility of an attack and bolster defences in light of the ever-evolving capabilities of criminals with a cybersecurity partner they trust explicitly. That's us.

If you're interested in hearing about how Clavister can help you stay on top of cyber threats and increase business productivity, get in touch here.

Disclaimer

Clavister Holding AB published this content on 24 November 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 24 November 2021 08:59:03 UTC.


ę Publicnow 2021
All news about CLAVISTER HOLDING AB (PUBL.)
01/19Partnership with Nokia Helps Clavister Expand in Australia
AQ
01/19Clavister Announces an Order Intake from Railway Infrastructure Company in Australia
CI
20212022 : An evolving cybersecurity landscape
PU
2021CLAVISTER : The Effects of Log4j 2
PU
2021New NGFW Platform and Subscription Based Pricing Help Clavister Drive Orders
AQ
2021Clavister Introduces a New High-Performance Next-Generation Firewall Platform Series an..
CI
2021ANOTHER DAY, ANOTHER DATA LEAK : Fortinet and the security lessons learned
PU
2021Clavister Recognises Infinigate, Ratho, NCC-Info, Pegasus IT and .XNC by Awarding them ..
AQ
2021Clavister - Acquired AI Capabilities in Focus
AQ
2021CLAVISTER Q3 2021 : Recurring revenues up 24%, positive EBITDA
AQ
More news
Financials
Sales 2021 129 M 14,0 M 14,0 M
Net income 2021 -84,0 M -9,13 M -9,13 M
Net Debt 2021 185 M 20,1 M 20,1 M
P/E ratio 2021 -3,81x
Yield 2021 -
Capitalization 326 M 35,5 M 35,4 M
EV / Sales 2021 3,97x
EV / Sales 2022 3,65x
Nbr of Employees 134
Free-Float 88,8%
Chart CLAVISTER HOLDING AB (PUBL.)
Duration : Period :
Clavister Holding AB (publ.) Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends CLAVISTER HOLDING AB (PUBL.)
Short TermMid-TermLong Term
TrendsBearishBearishBearish
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus BUY
Number of Analysts 0
Last Close Price 5,76 SEK
Average target price 10,75 SEK
Spread / Average Target 86,6%
EPS Revisions
Managers and Directors
John Vestberg President & Chief Executive Officer
David Nordstr÷m Chief Financial Officer
Viktor Kovacs Chairman
Nils UndÚn Vice President-Engineering
Jan Magnus Frykhammar Independent Director
Sector and Competitors