Case-Studies on Security

Said El Mansour Cherkaoui Ph.D. – Said Cherkaoui Ph.D.

Contact for needs of additional info:– Email: saidcherkaoui@triconsultingkyoto.com

Cyberattack Hits U.S. Based Vulnerable Auto Dealers Again

6/20/2024 11:03 AM

U.S. auto dealers are vulnerable to an another setback on Thursday june 20, 2024 as software provider CDK Global was hit by a second cyberattack. CDK, which serves about 15,000 auto dealerships, shut down its systems again and said it doesn’t have an estimate for when the software will be restored. The first cyberattack began early Wednesday, on what would normally be a busy holiday for dealers. The system was back up and running late Wednesday before hackers struck again, leading to a second day of disruption.

According to a 2022 study conducted by IBM, the average cost of a data breach is currently $4.35 million, an increase of 12.7% from the number cited in IBM’s 2020 report. The use of ransomware continues to increase and new threats emerge every day. 

What is the average cost of a data breach in 2022?
$4.35 million – Reaching an all-time high, the average cost of a data breach globally was $4.45 million in 2023, representing a 2.25% increase from 2022, when the average cost was $4.35 million. Mar 6, 2024

Cyberattack Hits U.S. Based Vulnerable Auto Dealers Again and Again. Is this part of Cyber Artificial Intelligent Warfare taking place for the supremacy on the innovation strategy pusued by established corporations and their invisible competitors that are taking advantage not of the market opportunities that needs major and overhall knowledge, finance and intelligent workforce plus continual adaption to differents an evolving demands in various cultural and political as well as economic and financial settings.

An attack on corporations who have already completed this drive are the new market to target and exploit for profit without a heavy investment, time and space. Such strategic trajectory can be considered also as the second dark and hidden face of the technological development and the other cutting edge of the artificial intelligence sword.

African Countries such as Morocco, identify in Artificial Intelligence as an all “One Solution that Fits and Resolves” all the Problems of Underdevelopement, underuse and underexploitation of the human and natural resources without taking in consideration the extensive needs for new source of energy for the Data Centers and the protection of these Data Centers. Hosted companies who have build their own data centers are adding more demands on energy and are actually the target of this launch of repetitive hacking attacks.

The spread around the world of these enterprising hackers are applying the adage “if the Customer does not come to you, we go to the Customer” an approach that enhanced and drove the E-Commerce and E-Trade and now the E-Hacking Business. So if the ‘Corporations does not come to you, so let go hack these corporations in their own house / data centers”.

Artificial Intelligence, Cyberattacks and Cybersecurity

The repeated cyberattacks on vulnerable U.S. auto dealerships indeed raise important questions about the intersection of cybersecurity, artificial intelligence (AI), and strategic warfare.

AI and Cybersecurity:

  • AI is increasingly important for enhancing back-office processes and customer service in various industries, including auto dealerships.
  • However, it also expands the reach of cyber threats, such as phishing attacks, which can compromise sensitive data and disrupt operations.

Strategic Warfare and Corporate Targets:

  • The scenario you describe highlights a strategic trajectory where cybercriminals target established corporations that have already completed their innovation drives.
  • These attacks aim to exploit vulnerabilities without heavy investments, leveraging the dark and hidden face of technological development.

Energy Needs and Data Centers:

  • You rightly point out that the extensive needs for energy in data centers are often overlooked. As AI adoption grows, data centers play a critical role, but their energy demands must be addressed.
  • Countries like Morocco, which identify AI as a solution for development challenges, need to balance AI adoption with sustainable energy sources for data centers.

Security Enhancement

Enhancing cybersecurity measures is crucial for companies to protect against cyber threats. Here are some practical steps they can take:

Advocate a Security Culture:

Keep Applications and Systems Updated: Regularly patch software and operating systems to address vulnerabilities and stay protected.

Maintain Current Backups: Regularly back up critical data to prevent data loss in case of an attack.

Restrict Access: Limit access to sensitive systems and data. Implement strong access controls and user permissions.

Deploy Next-Generation Firewalls: Use advanced firewalls to monitor and filter network traffic, blocking malicious activity.

Use Anti-Virus and Anti-Malware Software: Install and update security software to detect and prevent malware infections.

Track Emerging Threats: Foster a security mindset among employees. Everyone should prioritize security in their daily activities. Stay informed about new cyber threats and adjust security measures accordingly.

Password-Protect Mobile Devices and Wi-Fi Networks: Secure mobile devices and Wi-Fi networks with strong passwords to prevent unauthorized access. Remember that a comprehensive cybersecurity strategy aligned with company objectives and regulatory compliance is essential in today’s evolving landscape.

Resulting Direct Human Tragedy from Hackings

There is a women who his brother was one of the prominent technologist and was working in the UAE and there was approached by a recruiter and offered a lavish salary and he was hosted in luxury hotels and invited to highly reserved and select restaurants and beach resort in Asia before taken to a remote area in Burma or somewhere near by in warehouses were the conditions of work is a complete confinment with others kidnapped technologist and their conditions of work is the worse that can be described and their work is completing focusing on hacking companies around the world. Is the Sister of this technologist who asking government of her nationality to rescue her brother.

Kidnapped Technologists and Cybercrime

  • The case of the kidnapped technologists in Burma sheds light on the other side of technological advancement.
  • These criminal networks exploit skilled professionals, forcing them to work under harsh conditions, including hacking companies globally.

Sister’s Plea for Rescue:

  • The sister’s plea for her brother’s rescue underscores the urgent need for international cooperation in addressing cybercrime and protecting technologists from exploitation.

The convergence of AI, cybersecurity, and strategic interests creates complex challenges. Governments and organizations must collaborate to safeguard critical infrastructure, protect professionals, and ensure responsible AI adoption.