covid-19 cyberattacks

PFIZER COVID-19 VACCINE IN EU CYBERATTACK

Threat actors accessed Pfizer vaccine files submitted to EU regulators in the recent cyber attack to profit from the pandemic pain.

The criminals did not give up the act of stealing COVID-19 vaccine data. Another cyber attack was launched-this time, threat actors were able to break into the European Medicines Agency (EMA) server and access documents about vaccine candidates from Pfizer and BioNTech.

With the spread of COVID-19 and the increase in the number of deaths, malicious actors have taken advantage of global despair and suffering to take a series of particularly cruel efforts, this is just another violation of this rule.

EMA, Pfizer and BioNTech have confirmed the attack, but did not disclose any details when investigating the matter.

The agency’s short statement said: “The EMA has always been the subject of cyber attacks.” “The IAEA has worked closely with law enforcement agencies and other relevant entities to quickly conduct a comprehensive investigation.” It added that details “will be provided in due course.”

Pfizer and BioNTech, the companies behind the proposed vaccine named BNT162b2 (a vaccine that has already been used in the UK and other regions for emergency use) also issued a statement, adding that the systems of the two companies are still safe, including personal data collected from patient trials.

“Today, we learned from the European Medicines Agency (EMA) that the agency has been under a cyber attack, and some documents related to the regulatory submission of Pfizer and BioNTech’s COVID-19 vaccine candidate BNT162b2 have been stored in a Pfizer-BioNTech statement said:” The EMA server has been illegally accessed. “It is important to note that no BioNTech or Pfizer systems related to this incident were compromised, and we do not know that any research participants can be identified through the data accessed.”

Most importantly, all parties ensure that violations will not slow down EMA’s review of vaccine distribution.

The rate at which the attacked COVID-19 vaccine
is unlikely to slow down is the ongoing attack on all aspects of the vaccine life cycle, from research and development to clinical trials and distribution.

Almost all striped crooks are unable to resist the rise of the COVID-19 pandemic. As early as March, the World Health Organization was attacked by a malicious website that tried to steal employee credentials.

By May, the FBI and CISA were forced to issue a statement warning of the Chinese nation-state-supported attack on the healthcare industry that has extensive research on COVID-19 treatment and therapies.

The FBI and CISA said in a joint statement issued on May 13: “The medical, pharmaceutical and research departments committed to the COVID-19 response should be aware that they are the main targets of this activity and have taken the necessary steps to Protect its system.”

Two months later, in July, the US Department of Homeland Security, the US National Cyber ​​Security Center and the Canadian Communications Security Agency issued a joint alert to warn the cybercriminal group APT29 (also known as CozyBear), whose target is the academic institution engaged in research on COVID -19 vaccine.

“Through 2020, the target audience of is various organizations involved in the development of the COVID-19 vaccine in Canada, the U.S., and the U.K., most likely to steal information and intellectual property related to the development and testing of the COVID-19 vaccine, the report said.

By late July, the US Department of Justice accused China of monitoring Moderna for the purpose of “reconnaissance” of the company’s vaccine research.

Third-party vendors are also easy targets. Medical software provider eResearchTechnology provides a platform for pharmaceutical companies to conduct clinical trials and is the target of early ransomware attacks. Ransomware attacks force researchers to re-track the slow and tedious pen and paper data tracking.

Once vaccine development enters the production stage, malicious actors will continue to work hard to achieve capitalization.

Vaccine manufacturer Dr. Reddy’s laboratory (which signed a contract with the Russian government to manufacture the Sputnik V COVID-19 vaccine) was forced to close factories in India, Russia, the United Kingdom, and the United States after a cyber attack occurred in mid-October.

As of the cold supply chain attack
in early December, criminals turned their attention to a limited number of companies that could distribute vaccines under the necessary ultra-low temperatures. Gavi, a vaccine alliance that aims to convene “cold chain” companies for vaccine distribution, was attacked in September.

Recently, a phishing email was sent, posing as an executive from Haier Biomedicine, one of the only end-to-end cold supply chain providers, in an attempt to steal credentials. This attack was discovered by IBM.

On December 7, the European Union law enforcement agency Europol issued a warning that illegal COVID-19 vaccine activity on the dark web has increased, including the sale of counterfeit vaccines.

Europol warned: “Tests on counterfeit influenza vaccines have confirmed that criminals will seize the opportunity as soon as they appear on the scene.” “Due to the pandemic, the demand for influenza vaccines is higher than in previous years and there is a risk of shortages. Criminals use production. The fake flu vaccine reacts quickly. The same can happen when the COVID-19 vaccine is obtained.”

In turn, CISA issued guidelines on the need for cybersecurity vigilance in the vaccine supply chain to Operation Warp Speed, the COVID-19 vaccine development and distribution monitoring team designated by the US government.

The CISA statement said: “IBM X-Force has released a report of malicious cyber participants in the cold chain of COVID-19, which is an important part of delivering and storing vaccines at safe temperatures.” “Cyber ​​actors impersonate organisms. Medical companies are sending phishing and spear-like e-mails to executives and global organizations engaged in vaccine storage and transportation to obtain account credentials. These e-mails are formed as quotations for participating in the vaccine program.”