los 10 peores incidentes de ciberseguridad en 2021

The 10 worst cybersecurity incidents in 2021

The whole world has been going through a giant problem in terms of digital security, cybercriminals in many cases are one step ahead of people and companies and every day they invent new ways to steal information, money and data. 

Malwares, viruses, hackers, identity theft, phishing, fake news and many other incidents are our daily bread and if we don’t do something to protect ourselves, we will always be at the mercy of hackers. 

index

1. 10 worst cybersecurity incidents in 2021

2. Encrypted, an effective solution to protect your data and communications

10 worst cybersecurity incidents in 2021

Today, we want to show you the 10 worst cybersecurity incidents that affected 2021 and continue to affect 2022. Be aware of them and start protecting yourself and your company. 

1. Ransomware: Ransomware continues to lead as the number one digital threat worldwide. The number of victims in 2021 reached unimaginable figures and for this year they continue to grow

One of the largest attacks was the one that affected the Kaseya company, which paralyzed nearly 200 companies in the United States and other parts of the world. The main suspect in this attack was the Russian group REvil. 

Another of the most remembered incidents was the one that affected the Colonial Pipeline, the largest refined fuel infrastructure in the United States that covers a length of 8,550 kilometers. The pipeline had to be temporarily stopped due to this incident which is considered one of the worst in history against vital US infrastructure. 

2. SolarWinds : This attack was well known due to its great coordination to be perpetrated. It was a master plan hiding malicious code in legitimate software updates, just like you hear, becoming one of the biggest breaches of 2021

Even the former CEO of SolarWinds, Kevin Thompson, was forced to testify at a National Security hearing in the United States, where it was investigated how his company was not able to discover that they were intervened and how they were not able to discover the malicious code that affected more than 18,000 customers. 

3. Pegasus from NSO Group: Pegasus was an espionage project masked under a security premise by the company NSO, which mainly affected journalists, organizations, dissidents, politicians, among other sectors, violating rights such as privacy. This spyware was created by the Israeli company NSO Group supposedly as a government security project against terrorism and crime, however, they caused a lot of havoc on the internet with people and companies that had nothing to do with terrorism and crime. 

4. Apache Log4j: Also known as “Log4Shell” or “LogJam”. The problem that generates this vulnerability can potentially affect different companies and services such as the Apple iCloud or Steam clouds. As well as the construction video game Minecraft and other platforms that use the Java programming language.

Right now, Log4j is present on millions of Internet servers that now need to be quickly patched to avoid attacks by cybercriminals who can easily install malware by taking advantage of Log4Shell.

The bug was rated a maximum score of 10 out of 10 on the CVSS rating system, indicating the sheer severity of the problem.

celular malware celular malware

5. PrintNightmare: From time zero, PrintNightmare was considered a critical vulnerability as it allowed remote code execution. As its name indicates, the vulnerability came in one of the software for installing printers and since then, Microsoft has been working to solve this problem.

What makes it so dangerous is that by installing the printer with its driver, the driver can contain any malicious function, so a cybercriminal could gain access to the system and even take full control of the computer.

6. TPM chips: This discovery is the result of an investigation carried out and made public by Dolos Group, and whose authors gained full access to the hard drive of a laptop preconfigured to offer access to a corporate network through a secure VPN connection. This type of pre-configuration is very common in companies that deliver this equipment to their workers so that they can telecommute safely.

With the most common configuration, starting the system starts Windows directly, without a previous step in which it is necessary to enter a password. A single key, stored on the chip, with which the system is unlocked.

We are talking, therefore, of a security problem that is not easy to exploit, but that exists, that can be reproduced and that shows that even having a TPM chip does not guarantee complete security.

7. DeepFakes: Ever since they emerged as a simple game, they always had the potential to become what they are today, a major cybersecurity threat. And that can be used to manipulate, interfere and even impersonate organizations and people. 

In fact, nowadays on the deep web you can find documents and tutorials to learn how to falsify any type of news and be able to scam people.

8. FinFisher: Also known as FinSpy or Wingbird, this is commercial software developed by Gamma Group purportedly for electronic surveillance and only distributed to government agencies. However, it has been used as a spy and has been found in different malicious campaigns. It was recently found that it is capable of infecting Windows devices. 

9. Passwords: 123456 continues to be the most used password in the world during 2021 and part of 2022. This is a sign of the little culture and hygiene in terms of cybersecurity that we have. Despite education campaigns and many trainings on digital security, millions of people continue to use passwords that are too easy to crack, putting personal data and privacy at risk. 

10. Disinformation: Disinformation is another great threat of the digital world, there are few people who are trained, investigate and question what they read or see on social networks or the internet, that makes it easy for cybercriminals or malicious third parties to manipulate or misrepresent information to reach a specific purpose, steal data, information and money. It is necessary for people to use common sense and not take all the information they find as true. It is in our hands to combat cybercrime and protect our privacy. 

Encrypted, an effective solution to protect your data and communications

Blogs1 Blogs1

In Encrypted you will find the best solutions to protect your data and communications. From encrypted applications that will help protect your chats, calls and messages to encrypted cell phones that will military shield all the information of your team and company. You cannot be hacked, intervened or located.

You will also be able to find products such as the Encrypted Sim Card that will give you connectivity in more than 200 countries and a layer of security to any mobile device. 

Don’t risk your personal data and communications anymore. Start protecting yourself with the best. At Encryptados we have the perfect option for you.

Articulos Destacados

Suscríbete a nuestro Blog

Sign up and receive our free guide on “The 4 worst scenarios you can face if your Sim Card is hacked” and learn:

  • What are the risks we currently have in matters of mobile devices
  • Why you should protect your Sim Card and think about having an Encrypted Sim Card

Tu eSIM de Encriptados funciona en estos paises disponibles

  1. Anguila
  2. Antigua y Barbuda
  3. Argentina
  4. Bahamas
  5. Barbados
  6. Bolivia
  7. Brasil
  8. Islas Vírgenes Británicas
  9. Islas Caimán
  10. Chile
  11. Colombia
  12. Costa Rica
  13. Dominica
  14. República Dominicana
  15. Ecuador
  16. El Salvador
  17. Guayana Francesa
  18. Granada
  19. Guadalupe
  20. Guatemala
  21. Honduras
  22. Jamaica
  23. México
  24. Montserrat
  25. Antillas Neerlandesas
  26. Nicaragua
  27. Panamá
  28. Paraguay
  29. Perú
  30. Puerto Rico
  31. San Cristóbal y Nieves
  32. Santa Lucía
  33. San Vicente y las Granadinas
  34. Islas Turcas y Caicos
  35. Uruguay
  36. Venezuela

Tu eSIM de Encriptados funciona en estos paises disponibles

Sudáfrica

Tu eSIM de Encriptados funciona en estos paises disponibles

  1. Australia
  2. Nueva Zelanda

Tu eSIM de Encriptados funciona en estos paises disponibles

  1. Japón
  2. Arabia Saudita
  3. China
  4. Laos
  5. Corea del Sur
  6. Vietnam
  7. Irak
  8. Singapur
  9. Bangladesh
  10. Azerbaiyán
  11. Camboya
  12. India
  13. Baréin
  14. Sri Lanka
  15. Taiwán
  16. Filipinas
  17. Georgia
  18. Tailandia
  19. Armenia
  20. Israel
  21. Malasia
  22. Indonesia
  23. Pakistán
  24. Turquía
  25. Kazajistán
  26. Kirguistán
  27. Hong Kong
  28. Macao
  29. Uzbekistán
  30. Kuwait
  31. Mongolia
  32. Catar
  33. Emiratos Árabes Unidos

Tu eSIM de Encriptados funciona en estos paises disponibles

  1. Canadá
  2. Estados Unidos

Tu eSIM de Encriptados funciona en estos paises disponibles

  1. Albania
  2. Austria
  3. Bielorrusia
  4. Bélgica
  5. Bosnia y Herzegovina
  6. Bulgaria
  7. Croacia
  8. Chipre
  9. República Checa
  10. Dinamarca
  11. Estonia
  12. Finlandia
  13. Francia
  14. Alemania
  15. Grecia
  16. Hungría
  17. Islandia
  18. Irlanda
  19. Italia
  20. Letonia
  21. Liechtenstein
  22. Lituania
  23. Luxemburgo
  24. Macedonia
  25. Malta
  26. Moldavia
  27. Mónaco
  28. Montenegro
  29. Países Bajos
  30. Noruega
  31. Polonia
  32. Portugal
  33. Rumania
  34. Federación Rusa
  35. Serbia
  36. Eslovaquia
  37. Eslovenia
  38. España
  39. Suecia
  40. Suiza
  41. Ucrania
  42. Reino Unido

Tu eSIM de Encriptados funciona en estos paises disponibles

  1. Albania
  2. Alemania
  3. Andorra
  4. Angola
  5. Antigua y Barbuda
  6. Arabia Saudita
  7. Argelia
  8. Argentina
  9. Armenia
  10. Australia
  11. Austria
  12. Azerbaiyán
  13. Bahamas
  14. Baréin
  15. Bangladesh
  16. Barbados
  17. Bielorrusia
  18. Benín
  19. Bélgica
  20. Bolivia
  21. Bosnia y Herzegovina
  22. Brasil
  23. Bulgaria
  24. Camboya
  25. Canadá
  26. Catar
  27. Chequia (República Checa)
  28. Chile
  29. China
  30. Chipre
  31. Colombia
  32. Corea del Sur
  33. Costa Rica
  34. Croacia
  35. Dinamarca
  36. Dominica
  37. Ecuador
  38. El Salvador
  39. Emiratos Árabes Unidos
  40. Eslovaquia
  41. Eslovenia
  42. España
  43. Estados Unidos
  44. Estonia
  45. Federación Rusa
  46. Filipinas
  47. Finlandia
  48. Francia
  49. Gabón
  50. Georgia
  51. Ghana
  52. Gibraltar
  53. Granada
  54. Grecia
  55. Guadalupe
  56. Guatemala
  57. Honduras
  58. Hong Kong
  59. Hungría
  60. India
  61. Indonesia
  62. Irak
  63. Irán
  64. Irlanda
  65. Islandia
  66. Islas Feroe
  67. Israel
  68. Italia
  69. Jamaica
  70. Japón
  71. Jordania
  72. Kazajistán
  73. Kenia
  74. Kirguistán
  75. Kosovo
  76. Laos
  77. Letonia
  78. Liechtenstein
  79. Lituania
  80. Luxemburgo
  81. Macedonia
  82. Madagascar
  83. Macao
  84. Malasia
  85. Malaui
  86. Malta
  87. México
  88. Mongolia
  89. Montenegro
  90. Montserrat
  91. Nepal
  92. Nicaragua
  93. Nigeria
  94. Níger
  95. Noruega
  96. Nueva Zelanda
  97. Países Bajos
  98. Pakistán
  99. Panamá
  100. Paraguay
  101. Perú
  102. Polonia
  103. Portugal
  104. Puerto Rico
  105. Reino Unido
  106. República Dominicana
  107. Ruanda
  108. Rumania
  109. San Cristóbal y Nieves
  110. San Vicente y las Granadinas
  111. Santa Lucía
  112. Serbia
  113. Singapur
  114. Sri Lanka
  115. Sudáfrica
  116. Suecia
  117. Suiza
  118. Tailandia
  119. Taiwán
  120. Tanzania
  121. Túnez
  122. Turquía
  123. Ucrania
  124. Uganda
  125. Uruguay
  126. Uzbekistán
  127. Venezuela
  128. Vietnam
  129. Zambia