Cyber security experts form coronavirus taskforce to combat ransomware attacks

COVID-19 CTI League wants to protect frontline medical resources

Cybersecurity experts across 65 countries have teamed up to combat ransomware attacks on hospitals during the coronavirus outbreak.

Giving themselves the moniker of COVID-19 CTI League, the group has come together to protect the technological infrastructure of frontline medical resources from hackers during the pandemic.

The COVID-19 CTI League touts itself as a community of sharing information with the goal of helping the medical sector during this difficult time. The league’s volunteers assist each other with tasks such as malware analysis, hunting queries and cyber investigations.

Ohad Zaidenberg, the founder of the project, is based in Israel. Other members of the COVID-19 CTI League management team include US-based Nate Warfield, Chris Mills and Marc Rogers.

“Since the coronavirus crisis came out, I understood that attacking against the medical sector is a game-changer that can cause death. I decided to create a community of cybersecurity experts that want to spend their free time and to use their abilities to protect the medical sector,” Zaidenberg told Cointelegraph.

“With my friends in the management team, we prove the real power of the infosec community. It gave us so much power to keep doing our job — to save a life.”

Around the world, hospitals have seen an increase in cyberattacks involving encrypting critical IT systems with malware. These online attackers have demanded Bitcoin as ransom for decryption keys. Unfortunately, hospitals with ageing IT infrastructures have become a prime target for these attacks during the pandemic.

The COVID-19 CTI League is searching for additional cybersecurity experts willing to join their ranks. For those interested in joining the COVID-19 CTI League in their endeavours, the league encourages them to visit their website.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

How can you protect your business from crypto-ransomware?
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019
CMS platforms succumb to KashmirBlack botnet as businesses rush online
Security

CMS platforms succumb to KashmirBlack botnet as businesses rush online

22 Oct 2020
Government agencies see misconfigured cloud services as top security threat
Security

Government agencies see misconfigured cloud services as top security threat

22 Oct 2020
Lookout reveals mobile-first endpoint detection and response solution
Security

Lookout reveals mobile-first endpoint detection and response solution

21 Oct 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Mobile browser flaw exposes users to spoofing attacks
Security

Mobile browser flaw exposes users to spoofing attacks

21 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020