CrowdStrike, AT&T, And The Big Money Question
In the midst of covering CrowdStrike’s inadvertent bug push—and the ensuing chaos at airports, communication services, and thousands of businesses—two cyber stories got relatively little airtime:
Since many cyber criminals are in it for the money, paying a ransom is theoretically a legitimate way to end a cyber incident.?
Would you pay the ransom?
If you get hacked… should you pay the ransom? There are pros and cons to both approaches.?
The benefits of paying the ransom:
Some organizations that choose to pay ransoms might also charactertize it as learning; the ransom is the cost of getting their operations back as quickly as possible so they can prioritize cybersecurity going forward.
The drawbacks of paying a ransom:
Learn from the mistakes of others
CDK suffered from a ransomware attack—a type of attack where malcious software blocks access to a user’s computer after they open the file. That means, unfortunately, someone (or multiple people) likely opened a dangerous file without realizing it.?
→ How to prevent this in your organization: Training for employees on how to spot obvious scams (e.g. checking the sender domain) and encouraging employees to confirm sender authenticity before downloading any files.
AT&T’s incident came from a hacker group breaching Snowflake, a cloud-based data engineering platform. In this case, hackers noticed some of Snowflake’s data was unencrypted, and jumped at the crime of opportunity.?
→ How to prevent this in your organization: Talk to your vendors about where your organization’s data is stored, to ensure they are following best-practice protocols.
You need to go on cyber offense
Both of these incidents are situations where hackers broke through cyber defenses. They found a way around, using whatever tools they could get a hold of, and it worked.?
What’s the solution, then? Cyber offense.?
It’s not enough to build a strong wall and wait for the enemy to attack—your organization has to be vigilant for potential enemies.
Here’s a great example: Ferrari.?
One executive received a phone call “from the CEO,” talking about a big (and highly confidential) acquisition the company planned. Reportedly, the voice on the phone was nearly perfect—but there was an ever-so-slight hint of mechanism to it. The voice occasionally broke, not quite sounding human.
So the executive paused the conversation and asked the CEO to verify himself.?
But rather than asking questions that could be researched online, he picked something only the real CEO would know: the name of a book the CEO recommended just a few days prior in a one-on-one meeting.?
Being a vishing (voice phishing) scam, of course the robot could not answer the question—and the call ended without the executive giving away any sensitive information that could have led to a breach.
This is a classic story of how simple (and effective) cyber offense can be; the simple but bold step of asking for human verification saved the company untold cost, headache, and risk.?
This post originally appeared on the Connected & Newsletter by Protexxa
Subscribe now to get more insights directly in your inbox every two weeks.
→ Don’t forget to follow Protexxa on LinkedIn
The Cyber Detail: News, events, and resources
Headlines worth reading:
Resources, guides, and research:
Tips to up your cyber offense
? Get skeptical — Listen to your human intuition. If an email seems off or a phone call seems mechanical, ask for verification before following any instructions (or downloading any file).
? Learn from others — You don’t need to be the second instance of the same attack. When others face cyber incidents, learn what happened… then make sure you fix that gap in your organization.
? Security is an ecosystem — Review your vendors’ cyber and quality protocols. Partner with them, if possible, to share best practice approaches to cyber. Remember: you both win if you’re both more safe.
ICYMI: Cyber headlines that still matter
Israeli cybersecurity firm Wiz rejects Google’s $23 billion takeover offer (The BBC): Wiz founder’s note to employees said he was “flattered” by the offer, but would ultimately say no.
79% of financial firms cite cyber risk as the key thing stopping digital transformation (FinTech Magazine): Further, 77% of investment firms and 69% of financial institutions see the need to demonstrate resilience against cyberattacks and stay ahead of AI advancements.?
Cyber professionals are burning out (HelpNet Security): Organizational leaders are worried a mix of burnout and talent shortages will lead to significant cyber risks on top of the human toll.
Subscribe to Connected & Protected to get more insights directly in your inbox every two weeks
→ Don’t forget to follow Protexxa on LinkedIn