Share

Computer users open the door to cybercrime

Washington - When a cyber security breach hits the news, those most closely involved often have incentive to play up the sophistication of the attack.

If hackers are portrayed as well-funded geniuses, victims look less vulnerable, security firms can flog their products and services, and government officials can push for tougher regulation or seek more money for cyber defences.

But two deeply researched reports being released this week underscore the less-heralded truth: The vast majority of hacking attacks are successful because employees click on links in tainted emails, companies fail to apply available patches to known software flaws, or technicians do not configure systems properly.

These conclusions will be in the minds of executives attending the world's largest technology security conference next week in San Francisco, a conference named after lead sponsor RSA, the security division of EMC.

In the best-known annual study of data breaches, a report from Verizon Communications to be released on Wednesday found that more than two-thirds of the 290 electronic espionage cases it learned about in 2014 involved phishing, the security industry's term for trick emails.

Patchable vulnerabilities

Because so many people click on tainted links or attachments, sending phishing emails to just 10 employees will get hackers inside corporate gates 90% of the time, Verizon found.

"There's an overarching pattern," said Verizon scientist Bob Rudis. Attackers use phishing to install malware and steal credentials from employees, then they use those credentials to roam through networks and access programs and files, he said.

Verizon's report includes its own business investigations and data from 70 other contributors, including law enforcement. It found that while major new vulnerabilities such as Heartbleed are being used by hackers within hours of their announcement, more attacks in 2014 exploited patchable vulnerabilities dating from 2007, 2010, 2011, 2012 and 2013.

Another annual cyber report, to be released on Tuesday by Symantec, found that state-sponsored spies also used phishing techniques because they work and because the less-sophisticated approach drew less scrutiny from defenders.

Once inside a system, however, the spies turned fancy, writing customised software to evade detection by whatever security programs the target has installed, Symantec said.

"Once I'm in, I can do what I need to," said Robert Shaker, an incident response manager at Symantec. The report drew on data from 57 million sensors in 157 countries and territories.

Another troubling trend Symantec found involves the use of "ransomware", in which hackers encrypt a computer's files and promise to release them only if the user pays a ransom. (Some 80% of the time, they do not decrypt the files even then.)

The new twist comes from hackers who encrypt files, including those inside critical infrastructure facilities, but do not ask for anything. The mystery is why: Shaker said it is not clear whether the attackers are securing the information for resale to other spies or potential saboteurs, or whether they plan on making their own demands in the future.

Healthcare target

While many of the biggest breaches of the past two years involved retailers, the healthcare industry has figured heavily in recent months. Former FBI futurist Marc Goodman said that both spies and organised criminals are likely at work, the former seeking leverage to use in recruiting informants and the latter looking to cash in on medical and insurance fraud.

Verizon's researchers said that to be most effective, information-sharing would have to be essentially in real time, from machine to machine, and cross multiple sectors, a daunting proposition.

The company said the best indicator of the cost of an incident is the number of records compromised, and that the cost rises logarithmically, flattening as the size of the breach rises.

According to the new Verizon model, the loss of 100 000 records should cost roughly $475 000 on average, while 100 million lost records should cost about $8.85m.

We live in a world where facts and fiction get blurred
Who we choose to trust can have a profound impact on our lives. Join thousands of devoted South Africans who look to News24 to bring them news they can trust every day. As we celebrate 25 years, become a News24 subscriber as we strive to keep you informed, inspired and empowered.
Join News24 today
heading
description
username
Show Comments ()
Rand - Dollar
19.29
-0.7%
Rand - Pound
23.87
-1.1%
Rand - Euro
20.58
-1.2%
Rand - Aus dollar
12.38
-1.1%
Rand - Yen
0.12
-1.2%
Platinum
943.50
+0.0%
Palladium
1,034.50
-0.1%
Gold
2,391.84
+0.0%
Silver
28.68
+0.0%
Brent Crude
87.29
+0.2%
Top 40
67,314
+0.2%
All Share
73,364
+0.1%
Resource 10
63,285
-0.0%
Industrial 25
98,701
+0.3%
Financial 15
15,499
+0.1%
All JSE data delayed by at least 15 minutes Iress logo
Company Snapshot
Editorial feedback and complaints

Contact the public editor with feedback for our journalists, complaints, queries or suggestions about articles on News24.

LEARN MORE
Government tenders

Find public sector tender opportunities in South Africa here.

Government tenders
This portal provides access to information on all tenders made by all public sector organisations in all spheres of government.
Browse tenders