Dark Reading (21 June 2012) came out with security news of a AutoCAD Worm called ACAD/Medre.A that targets design documents.
I also found warnings about this vulnerability at PC magazine (24 June 2012).
This malware was discovered by computer security firm ESET.
This is a serious exploitation in the industry leader for computer-aided design and drafting that is used to create most of our architectural blueprints.
Approximately 10,000 machines are said to have been affected in Peru and vicinity, with documents being siphoned off to email accounts in China.
With information on our architectural structure and designs for skyscrapers, government building, military installations, bridges, power plants, dams, communication hubs, transportation facilities, and more, our critical infrastructure would be seriously jeopardized.
This can even be used to steal intellectual property such as designs for innovations or even products pending patents.
This new malware is another example of how cyber espionage is a scary new reality that can leave us completely exposed from the inside out.
Need any more reason to "air gap" sensitive information and systems?
(Source Photo: here with attribution to Wade Rockett)
I also found warnings about this vulnerability at PC magazine (24 June 2012).
This malware was discovered by computer security firm ESET.
This is a serious exploitation in the industry leader for computer-aided design and drafting that is used to create most of our architectural blueprints.
Approximately 10,000 machines are said to have been affected in Peru and vicinity, with documents being siphoned off to email accounts in China.
With information on our architectural structure and designs for skyscrapers, government building, military installations, bridges, power plants, dams, communication hubs, transportation facilities, and more, our critical infrastructure would be seriously jeopardized.
This can even be used to steal intellectual property such as designs for innovations or even products pending patents.
This new malware is another example of how cyber espionage is a scary new reality that can leave us completely exposed from the inside out.
Need any more reason to "air gap" sensitive information and systems?
(Source Photo: here with attribution to Wade Rockett)