Share on social networks!

Failed ransomware attack on ENDESA

Earlier this week, the energy company Endesa suffered a ransomware cyberattack that had attacked its internal systems and its workers, but its defenses have successfully repelled it.

They confirmed that ransomware was detected on their internal network early Monday. "The company temporarily isolated the corporate network to carry out all necessary interventions to eliminate any residual risk," they stated. The connection "was safely restored at 9:20 a.m. the same day." The investigation into the incident is ongoing.

The ransomware had infected the company's servers, which has warned all its employees not to connect through the VPN they use to telework until the incident was resolved. It was early in the afternoon when employees were able to connect normally.

This is not the first time that the company has suffered this type of attack. In 2016, ENDESA suffered a Locky ransomware campaign, which sought to infect the energy company's customers by sending emails with fake invoices from fake accounts similar to those used by the company. , so that when the user tries to see them, the virus will be downloaded to the computer.

Although I have already spoken lightly about ransomware (data hijacking) in other articles, let us remember that it is a type of cyber attack that affects operating system files, blocking them and that is normally accompanied by a ransom request in exchange for removing the block. An example is that of Adif, the public manager of the railway networks. The group that operates the ransomware Sodinokibi demanded a ransom in exchange for not leaking information they had stolen.

These attacks are increasingly frequent in large companies, the problem is that most do not dedicate all the necessary effort to preparing their cybersecurity.

Luckily, it seems that this time ENDESA has been able to control the intrusion and put its systems back into operation in a few hours, a sign that it is well prepared for this type of attack and has good security habits.

Subscribe to our newsletter to stay up to date with all the news

EIP International Business School informs you that the data in this form will be processed by Mainjobs Internacional Educativa y Tecnológica, SAU as the party responsible for this website. The purpose of collecting and processing personal data is to manage your subscription to the newsletter as well as to send commercial information about the services of the data controller. The legitimacy is the explicit consent of the interested party. Data will not be transferred to third parties, except under legal obligation. You may exercise your rights of access, rectification, limitation and deletion of data at compliance@grupomainjobs.com, as well as the right to lodge a complaint with the supervisory authority. You can consult additional and detailed information on Data Protection in the Privacy Policy that you will find on our website.
Master Cybersecurity Professional Master

1 thought on “Ataque fallido de ransomware a ENDESA”

Leave a comment

EIP International Business School informs you that the data in this form will be processed by Mainjobs Internacional Educativa y Tecnológica, SAU as the party responsible for this website. The purpose of collecting and processing personal data is to manage your subscription to the newsletter as well as to send commercial information about the services of the data controller. The legitimacy is the explicit consent of the interested party. Data will not be transferred to third parties, except under legal obligation. You may exercise your rights of access, rectification, limitation and deletion of data at compliance@grupomainjobs.com, as well as the right to lodge a complaint with the supervisory authority. You can consult additional and detailed information on Data Protection in the Privacy Policy that you will find on our website.