{"id":6745,"date":"2023-10-02T23:07:26","date_gmt":"2023-10-02T21:07:26","guid":{"rendered":"https:\/\/www.faster.cz\/studie\/pribeh-utoku-na-poskytovatele-kriticke-infrastruktury\/"},"modified":"2024-08-21T12:12:30","modified_gmt":"2024-08-21T10:12:30","slug":"the-story-of-an-attack-on-a-critical-infrastructure-provider","status":"publish","type":"studie","link":"https:\/\/www.faster.cz\/en\/study\/the-story-of-an-attack-on-a-critical-infrastructure-provider\/","title":{"rendered":"The story of an attack on a critical infrastructure provider"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Customer type<\/h2>\n\n\n\n<p>A critical infrastructure services company with more than 500 employees and an annual turnover of more than CZK 100 million CZK.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What situation did he deal with<\/h2>\n\n\n\n<p>In the past, the customer has received several reprimands from the Data Protection Authority in <strong>relation to data security<\/strong>. In addition, the company has experienced <strong>theft and misuse of customer emails<\/strong> for spamming.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What we helped with<\/h2>\n\n\n\n<p>With our help, the company has started to <strong>prepare the implementation<\/strong> of measures within the framework of the <strong>NIS2 deployment<\/strong>. This was preceded by an <strong>initial analysis<\/strong> which revealed a number of unpleasant findings.<br>In agreement with the customer, we deployed a <strong>monitoring probe<\/strong> into the network which within a short time revealed a compromised server controlled by attackers from East Asia. The situation required an <strong>immediate response<\/strong> to <strong>prevent further abuse<\/strong> of the client&#8217;s infrastructure. Experience showed that the customer was not prepared to effectively address these risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What the solution brought<\/h2>\n\n\n\n<p>We have prepared a comprehensive <strong>risk analysis<\/strong> and based on it, we have proposed specific<strong> security measures and processes<\/strong> that <strong>will prevent<\/strong> a similar situation from recurring in the future. We handed over the security project and helped <strong>to put it into practice<\/strong>. The company subsequently <strong>passed the retests<\/strong> with no error messages and significantly <strong>improved its overall level of security<\/strong>. However, a major effect for the customer has been the comprehensive upgrade of the performance and security management systems to reflect the new obligations arising from the commitments and direct designation under NIS2.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits of implementing information risk management<\/h2>\n\n\n\n<ul class=\"wp-block-list is-style-list-square\">\n<li>Prioritising further security investments and projects<\/li>\n\n\n\n<li>Determining the optimal balance between investment and the level of security achieved<\/li>\n\n\n\n<li>Obtaining information on the level of IS security achieved by an independent party<\/li>\n\n\n\n<li>Identifying risks and vulnerabilities that pose an immediate threat to the organisation&#8217;s key functions and assets<\/li>\n\n\n\n<li>Creating the basis for the development of the company&#8217;s ICT security documentation<\/li>\n\n\n\n<li>Identification of threats such as data leakage, abuse of privileges, human error, etc., including possible abuse scenarios<\/li>\n\n\n\n<li>Significant increase in IS security by implementing the proposed measures<\/li>\n\n\n\n<li>Obtaining arguments for management decisions on allocation of investments in IS security<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-btn-square-bordo-fill is-style-btn-bordo-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.faster.cz\/en\/product\/protection-of-network-and-traffic\/\" target=\"_blank\" rel=\"noreferrer noopener\">Customized solutions<\/a><\/div>\n<\/div>\n","protected":false},"featured_media":0,"template":"","kat":[89],"class_list":["post-6745","studie","type-studie","status-publish","hentry","kat-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The story of an attack on a critical infrastructure provider - Faster.cz<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.faster.cz\/en\/study\/the-story-of-an-attack-on-a-critical-infrastructure-provider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The story of an attack on a critical infrastructure provider - Faster.cz\" \/>\n<meta property=\"og:description\" content=\"Customer type A critical infrastructure services company with more than 500 employees and an annual turnover of more than CZK 100 million CZK. What situation did he deal with In the past, the customer has received several reprimands from the Data Protection Authority in relation to data security. In addition, the company has experienced theft [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.faster.cz\/en\/study\/the-story-of-an-attack-on-a-critical-infrastructure-provider\/\" \/>\n<meta property=\"og:site_name\" content=\"Faster.cz\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Fastercz\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-21T10:12:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Fastercz\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.faster.cz\\\/en\\\/study\\\/the-story-of-an-attack-on-a-critical-infrastructure-provider\\\/\",\"url\":\"https:\\\/\\\/www.faster.cz\\\/en\\\/study\\\/the-story-of-an-attack-on-a-critical-infrastructure-provider\\\/\",\"name\":\"The story of an attack on a critical infrastructure provider - Faster.cz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faster.cz\\\/#website\"},\"datePublished\":\"2023-10-02T21:07:26+00:00\",\"dateModified\":\"2024-08-21T10:12:30+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.faster.cz\\\/en\\\/study\\\/the-story-of-an-attack-on-a-critical-infrastructure-provider\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.faster.cz\\\/#website\",\"url\":\"https:\\\/\\\/www.faster.cz\\\/\",\"name\":\"Faster.cz\",\"description\":\"...\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.faster.cz\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The story of an attack on a critical infrastructure provider - Faster.cz","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.faster.cz\/en\/study\/the-story-of-an-attack-on-a-critical-infrastructure-provider\/","og_locale":"en_US","og_type":"article","og_title":"The story of an attack on a critical infrastructure provider - Faster.cz","og_description":"Customer type A critical infrastructure services company with more than 500 employees and an annual turnover of more than CZK 100 million CZK. What situation did he deal with In the past, the customer has received several reprimands from the Data Protection Authority in relation to data security. In addition, the company has experienced theft [&hellip;]","og_url":"https:\/\/www.faster.cz\/en\/study\/the-story-of-an-attack-on-a-critical-infrastructure-provider\/","og_site_name":"Faster.cz","article_publisher":"https:\/\/www.facebook.com\/Fastercz\/","article_modified_time":"2024-08-21T10:12:30+00:00","twitter_card":"summary_large_image","twitter_site":"@Fastercz","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.faster.cz\/en\/study\/the-story-of-an-attack-on-a-critical-infrastructure-provider\/","url":"https:\/\/www.faster.cz\/en\/study\/the-story-of-an-attack-on-a-critical-infrastructure-provider\/","name":"The story of an attack on a critical infrastructure provider - Faster.cz","isPartOf":{"@id":"https:\/\/www.faster.cz\/#website"},"datePublished":"2023-10-02T21:07:26+00:00","dateModified":"2024-08-21T10:12:30+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.faster.cz\/en\/study\/the-story-of-an-attack-on-a-critical-infrastructure-provider\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.faster.cz\/#website","url":"https:\/\/www.faster.cz\/","name":"Faster.cz","description":"...","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.faster.cz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/studie\/6745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/studie"}],"about":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/types\/studie"}],"wp:attachment":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/media?parent=6745"}],"wp:term":[{"taxonomy":"kat","embeddable":true,"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/kat?post=6745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}