Jackware: Next-Level Threat

Jackware: Next-Level Threat

CURRENT EVENTS

In light of the recent rise in ransomware claims/events, we believe it’s valuable to share new and interesting areas of exposure that most may not have previously contemplated. Typically, hackers seek to penetrate a company’s security systems with the intent of demanding a ransom payment in order to allow a Company/Governmental agency the ability to regain control of their systems/data. This new “jackware” takes it a step further. The hacker goes in and seeks to take control of your devices/smart devices to make them perform other functions rather than what they were intended to do.

EXAMPLE

What is jackware? Ransomware’s vicious cousin” is a good example that conveys how hackers turned up the temperature on a furnace system to greater than 2,000 degrees with the intent of burning the entire German factory down. Given the current Geo-political environment we are in, combined with the culture of extremists within our country, there is definitely cause for alarm here.

Let’s take a look at the situation between Twitter and Elon Musk for example, what if members of society who oppose Musk taking control of Twitter seek to hack into Tesla or Space X’s systems to create a disruption to those businesses? That is a scary type of scenario that a “jackware” event can cause.

The bigger issue, from an insurance perspective, is which policy would respond to resulting damage caused by a jackware event? This is where things get tricky – Bodily Injury/Property Damage would typically fall under a Commercial General Liability (CGL) policy, not a Cyber policy, although it may be too early and there may not be enough case law to make that determination. If your organization experiences one of these types of incidents, we believe the prudent thing to do would be to report this as a claim under both the Cyber Policy, as well as your CGL policy, in order to cover all bases and address all potential liabilities/exposures you may have from such a cyber related incident.

CYBER PICTURE
WATCH: Understanding and Applying the SEC’s New Cybersecurity Rules
In  this webinar, you will hear from Leading Cyber & Privacy Attorneys along with Insurance experts...
manufacturing (2)
Cyber Speak, Simplified: Breaking Down Technically Complex Issues for Non-Technical People
Cybersecurity is hot on nearly everyone’s mind, but how much does the average person really know? Although...
manufacturing (2)
Your Best Friend in Bolstered Cyber Security is the Insurance Advisor by Your Side
If you’re considering cyber insurance to bolster your company’s security posture, you might be wondering...
Share

Table of Contents

CYBER PICTURE
WATCH: Understanding and Applying the SEC’s New Cybersecurity Rules
In  this webinar, you will hear from Leading Cyber & Privacy Attorneys along with Insurance experts...
manufacturing (2)
Cyber Speak, Simplified: Breaking Down Technically Complex Issues for Non-Technical People
Cybersecurity is hot on nearly everyone’s mind, but how much does the average person really know? Although...
manufacturing (2)
Your Best Friend in Bolstered Cyber Security is the Insurance Advisor by Your Side
If you’re considering cyber insurance to bolster your company’s security posture, you might be wondering...
Powered by people and fueled by our vision and purpose.

BRP is an award-winning, entrepreneur-led, and inspired insurance distribution holding company delivering solutions that give our clients the peace of mind to pursue their purpose, passion, and dreams. Our family of firms’ best-in-class resources and diverse portfolio of services are innovating the industry by taking a holistic and tailored approach to insurance and risk management.