BreachExchange mailing list archives
Corporates Caught Unaware - Tales From The Front Line Of Cyber Security
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Tue, 24 Sep 2013 00:09:49 -0600
http://www.managementtoday.co.uk/features/1212659/mt-expert-corporates-caught-unaware-tales-front-line-cyber-security/ Ever thought your company is a potential target of state-sponsored hackers, eager to lay their hands on sensitive commercial information or use your IT infrastructure as a springboard to others’ systems? It sounds unlikely, but it isn't as far-fetched as it may seem. News media and governments in several countries have reported foreign states are showing a greater interest in commercial hacking and corporate espionage. At the front line, companies are now regularly having to tackle data breaches. Take for example the manufacturing company that discovered hackers had gained access to its systems. The hackers, in the pay of a nation state, had accessed and copied detailed plans for future products. These plans were of significant value in the hands of a third-party. We worked with the company to scan its network for viruses and establish whether data had been copied. It was a time-consuming and complex process which, in this case, meant we had to reverse engineer and analyse the code of the viruses. This eventually allowed the team to ensure the hacking had stopped and to identify and confirm which secrets were stolen. A similar scenario arose for a business involved in an auction to sell mineral rights worth several billion dollars. Halfway through the auction, it was found that the email system had been penetrated. This had allowed the system to be reprogrammed, with every incoming and outgoing email copied and sent to the hackers. The subsequent investigation suggested that the hacking had been carried out by one the companies involved in the auction in a move to gain an unfair advantage in the bidding process. Knowing your enemy can play a key part in defining your next steps. A lesson learned by several well-known brands, which have come under fire from online hacktivists. Having threatened to attack these companies as a result of a real or perceived insult hacktivists have published logins and passwords for users of the companies’ sites and even published emails from the CEOs. Even the most advanced security may prove inadequate against the onslaught of hackers intent on targeting the weakest link: people. Most computer users have been recipients of poorly worded ‘phishing’ emails one time or another, requesting online banking password resets or offering ‘lucrative,’ never to be missed deals. While the vast majority would hit the Delete button, it only takes one unwitting member of staff to fall for the scam before security has been breached. When the email appears to come from the CEO, alongside a plausible explanation ('I’ve sent this email from my private email address as I have not been able to access the office network'), the number of individuals clicking on the offending link could be even greater. This predicament was faced by several dozen associates at a London law firm. The email, sent after-hours from the ‘private’ email address of the ‘managing partner’, asked each recipient to review an attached document, the content of which would be discussed at a meeting the next morning. The document contained a virus. Once opened, the virus was deposited on the laptop or home computer of the unfortunate associate and from there onto the law firm’s network. Such examples of ‘spear phishing’, or highly targeted fraudulent emails that may introduce a virus, activate malware to log keystrokes, copy emails, or even record phone conversations, are pretty common. The challenge is to stop staff from clicking on innocent-looking links and using the same easy-to-guess password for multiple devices and online accounts. Therefore the development of an information security policy and standards of conduct that instils security into the company’s culture is as important as ensuring that firewalls, anti-virus detection software is up to date. Of course, the threat that your staff inadvertently introduce a virus into your network is not the only – or even primary way – they can cause a data breach. And when thinking of your staff, spare a thought for the threat of insider data theft. Dropbox, Google Drive and Apple iCloud, as well the ubiquitous nature of social media, have all contributed to breaking down the barriers between personal and work data. Add to this the growth of private smartphones and tablets in the workplace, and employers are facing an uphill struggle to prevent disgruntled or departing staff from siphoning off a veritable treasure throve of sensitive data. In one such case, a defence contractor won a multimillion-dollar judgment against a group of former employees who used stolen company data to set up a competing business. The conspiracy by these former employees, the data stolen and its intended use were all revealed as a result of detailed computer forensic analysis, which ultimately proved their undoing. Hacking and data theft is one of the greatest business and technology threats of the digital age. We are well past the point where any organisation can responsibly ignore this risk. There are different lessons to be learned from each and every incident but two critical factors regularly stand out. First, staff must be trained in how to prevent and respond to such attacks. Second, incident response cannot be done on the fly. An initial security audit, followed by a regularly updated incident response plan, will significantly enhance the prospects of successfully tackling an incident, irrespective of whether the adversary wears the cloak of a nation state, an opportunistic hacker or someone closer to home.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: # OWASP http://www.appsecusa.org # Builders, Breakers and Defenders # Time Square, NYC 20-21 Nov o()xxxx[{::::::::::::::::::::::::::::::::::::::::> Risk Based Security (http://www.riskbasedsecurity.com/) Risk Based Security offers security intelligence, risk management services and customized security solutions. The YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.
Current thread:
- Corporates Caught Unaware - Tales From The Front Line Of Cyber Security Audrey McNeil (Sep 27)