TSMC Virus Attack and the Need for a Secure Data Workflow for Manufacturing Networks
Details of the TSMC Virus Attack
On Friday, 3 August 2018, the Taiwan Semiconductor Manufacturing Company (TSMC) was reportedly hit with a variant of the 2017 WannaCry ransomware, and from current reports the initial infection occurred during the software installation process of a new tool. The malware then spread through TSMC’s computer network and infected systems.
A quote from TSMC CEO C.C. Wei claims that an “unidentified” vendor provided the company with the infected tool, so this was not an issue of TSMC being hacked, but rather a manufacturing supply chain management issue.
Attacks like the TSMC attack highlight more than ever the need for setting up Secure Data Workflow processes for critical operations, like manufacturing production processes.
Secure Data Workflow a Solution for Protecting Isolated “Manufacturing” networks.
The key to security for the “manufacturing” sector is setting up an isolated network(s) and then establishing a secure data workflow into and out of them, and even within them. The secure data workflow process should consist of many defenses that guard the data both in transit and in storage.
MetaDefender Vault is a perfect example of a product offering that can serve as the core of a secure data workflow process. Points of entry into the isolated network can be precisely defined and protected, even using data diodes for extreme isolated network use cases. Once the files are stored in the Vault, they can then be locked down for a set period of time to help prevent malware outbreaks, multi-scanned for malware with multiple signature-based and heuristic anti-malware engines on a frequent basis, and protected with a role-based work flow that allows granular control of a well-defined process of moving ans storing files in an isolated network.

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure