Home / Cybersecurity / Cadbury owner Mondelez sues Zurich for refusing to pay-up on cyber security insurance policy – www.computing.co.uk

Cadbury owner Mondelez sues Zurich for refusing to pay-up on cyber security insurance policy – www.computing.co.uk

Cadbury owner Mondelez sues Zurich for refusing to pay-up on cyber security insurance policy

Is Mondelez crying over spilt Dairy Milk?

Cadbury owner Mondelez is suing Zurich Insurance for its refusal to pay-up on a $100 million claim relating to the NotPetya virus outbreak in 2017.

Mondelez has filed suit in Illinois, according to the Financial Times. The food conglomerate that acquired Cadbury in 2010 had been seeking the insurance pay-out under the terms of its property cover, which is underwritten by the Swiss insurance giant.

In those papers, Mondelez claimed that the company had been hit twice by NotPetya, rendering 1,700 servers and 24,000 laptops “permanently dysfunctional” as a result.

Under the terms of the property insurance policy, Mondelez claims that it was entitled to claim for up to $100 million for “physical loss or damage to electronic data, programs, or software, including physical loss or damage caused by the malicious introduction of a machine code or instruction”.

However, while Zurich was initially prepared to make an interim $10 million up-front payment, it later refused to pay, citing an exclusion clause for a “hostile or warlike action” by a sovereign power, or people acting on their behalf.

Zurich was able to cite security experts’ claims that the NotPetya attack appeared to have been one of many launched by Russia against its neighbour Ukraine.

NotPetya struck in June 2017, just one month after WannaCry. Both made use of the same EternalBlue exploit that older, unpatched versions of Microsoft Windows were vulnerable to.

EternalBlue was revealed following the Shadow Brokers series of leaks of US National Security Agency exploits. These started in the summer of 2016, with EternalBlue part of the fifth and final tranche of leaks in April 2017. The Windows security flaw that EternalBlue took advantage of had been patched a month earlier.

The initial NotPetya attack vector was the poorly secured update server of a Ukrainian accounting company, whose software is used by around four-fifths of business in the former Soviet state. This enabled the virus to be quickly propagated, not just to organisations across Ukraine, but multinationals operating in the country.

An ensuing investigation found that the update servers of the accounting firm, ME Doc, hadn’t been patched in four years. The outbreak occurred on the even of the Constitution Day public holiday in Ukraine.

Mondelez wasn’t the only company badly affected by NotPetya. Shipping giant Maersk pinned a $300 million cost on the outbreak, while UK-based fast-moving consumer goods maker Reckitt Benckiser admitted in a trading warning one month after the attack that it had cost the company £100 million.

Former Reckitt CIO Darrell Stein left the company shortly after.

Further reading


Source link

Check Also

Pointe Capital Management LLC Has $785,000 Holdings in ETFMG Prime Cyber Security ETF (HACK) – Fairfield Current

Pointe Capital Management LLC raised its holdings in shares of ETFMG Prime Cyber Security ETF …

Leave a Reply

Your email address will not be published. Required fields are marked *