Nation-state backed hackers going after COVID vaccine supply chain

Sophisticated operation is well-researched and well-placed, aimed at EU. …

A climate controlled thermo haulage truck trailer outside the Pfizer Inc. facility in Puurs, Belgium, on Thursday, Dec. 3, 2020.

Enlarge / A climate controlled thermo haulage truck trailer outside the Pfizer Inc. facility in Puurs, Belgium, on Thursday, Dec. 3, 2020.
Bloomberg | Getty Images

reader comments

125 with 63 posters participating

Cyber attackers have targeted the cold supply chain needed to deliver COVID-19 vaccines, according to a report detailing a sophisticated operation likely backed by a nation-state.

The hackers appeared to be trying to disrupt or steal information about the vital processes to keep vaccines cold as they travel from factories to hospitals and doctors’ offices.

According to the report by IBM’s threat intelligence task force, which advises companies and the public sector on cyber security, they targeted organizations associated with a cold chain platform run by the Gavi vaccine alliance, a public-private partnership for developing immunization for poorer countries.

Many of the COVID-19 vaccines have to be kept cold to keep them from spoiling. Pfizer and BioNTech’s vaccine must be kept between minus 70C and minus 80C, while Moderna’s shot needs to be transported at minus 20C.

The attackers pretended to be an executive at a Chinese supplier of ultra-cold refrigeration to mount a phishing campaign trying to obtain usernames and passwords, the report said.

Nick Rossmann, IBM’s global lead for threat intelligence, said he believed the hackers were either looking to disrupt the vaccine delivery process or steal intellectual property.

“One side of it is cyber espionage: How do you get vaccines out? How is the manufacturing process working for refrigeration? How are you managing the entire logistics chain?” he

Continue reading – Article source

Similar Posts: