A New Kind of Cyberthreat - Extortion

A New Kind of Cyberthreat - Extortion

A cyber extortion campaign was just discovered that has targeted more than 200 specific identities in 39 countries with phishing attacks based on authentic Google emails. The attacks pull documents from the victims’ Google Drives and dump them strategically onto the Internet.

But not before they are altered to create a disinformation campaign that provides false impressions of major journalists doing things like associating with CIA-backed plots to discredit world leaders and fuel revolutions in countries like Russia and Iran. The attacks have targeted prime ministers, ambassadors, senior military officers, heads of energy companies, academics, activists, journalists, and representatives of non-governmental organizations.

Apparently, patient-zero was David Satter, an investigative journalist who is known for his reporting on Russia and prominent Russian opposition figures and has been banned from the country since 2013. He has famously written in-depth pieces about Alexei Navalny, the prominent Russian anti-corruption activist.

Last October, Satter fell for a phishing attack and all of his documents were stolen, modified and re-distributed on the web. It is one thing when a political or academic figure’s work is modified to suit a particular agenda, but an entirely different thing when a C-level executive is impersonated in a similar way. The extortion demands in Satter’s case have not been made clear as of yet, but they will likely be steep.

Imagine the possibilities in modifying correspondence or internal memos from the chief executive officer of a corporation to fake the denigration of key customers, employees, associates or partners.

Bad guys regularly create dossiers on any entity that is perceived to be an obstacle to their social or political agenda which can include individuals, public and private entities, government officers, and other entities. Dossiers can be created from social media content and then correlated with phishing attacks and document exfiltration like the one described here.

Once the goods are collected, the information is easily marketed (aka, doxing) through the dark web via hacker forums, pastebins and dark net social media networks. The goal of doxing has traditionally been to threaten, embarrass, harass, and humiliate the individual or organization to further the hacktivists agenda.

But, this new form of doxing has a very different purpose in mind: Extortion.

The controlled leak of a single incriminating document will generally be enough of a teaser to get a senior executive’s attention. Denying the accuracy of an internal memo is not going to be enough to erase suspicion, especially when compounded through clever correlation with other data that builds a case for authenticity. The available options are both terrible.

The compromised executive publicly announces denial and pleads innocence while the release of documents intensifies in both content and volume which adds to the attention the leak is receiving. Or, the executive quietly agrees to pay off the attackers with the hope that all incriminating evidence will be destroyed and not used again.

In the case of the now famous Sony Pictures hack, the leak of information threatened their executive’s personal financial futures, seriously embarrassed CEO, Michael Lynton and caused Co-Chairman Amy Pascal to resign, among other major discordance and disruption. And that wasn’t even a clear extortion hack.

Fortunately, there are ways in which we can fight this form of cyber-extortion.

A company can employ software and services that maps their digital footprint and monitors hacker forums and other illegal markets for negative sentiment about a company or individual, looking for company-specific dark-net threats. The irony of the cyber-attacker personality is a need to brag or boast about accomplishments among their peers and that chatter can be analyzed by today’s modern machine-learning and predictive analytics software.

A case in point is the shooter who terrorized Virginia Tech in 2007 and killed 32 people, who posted his obsession with the Columbine massacre openly and repeatedly on Facebook and other social media sites for weeks before the tragic event unfolded.

Today’s technology would have identified that obsession as a real threat, and we would probably have had a very different outcome as a result.

We are also able with current technology to run comparative analyses assessing how a particular company might line up against others in industry sector benchmarks, and we can do this is multiple languages including Russian, Arabic, Chinese as well as English.

It is probably fair to assume that cyber-espionage attackers with a specific political agenda successfully hacked into the email account of John Podesta, the former chairman of Hillary Clinton's unsuccessful presidential campaign. And, if you are a Hillary supporter, you have a deep appreciation for the damage such a phishing campaign might cause.

From whatever source, the damage can be fatal and the remediation options are all bad. Far better to bite the bullet, get these advanced levels of protection installed and layered in place and be ready should your top corporate leaders come into focus as targets of cyber-espionage or extortion.

In fact, if you are a true CIO or even one in title only, you have a fiduciary responsibility to prevent attacks of this nature and you are likely be held legally and personally accountable for the outcomes.

Peter Christo

Founder, Strategy Advisor and Educator in Entrepreneurship, Innovation & Commercialisation.

7 年

Excellent article,.. its amazing how important our business gets after the event!

回复
Karen Hurst

Lead Expert of Quantum Technology, Nano, and Synthetic Biological Computing for Kaiser-Permanente

7 年

Hope you do not mind Steve; I would like to share your article as a point that I want to emphasize to folks on QC. I have held back for 2 years; and now the time has come for me to expose a very ugly and factual risk.

回复
Karen Hurst

Lead Expert of Quantum Technology, Nano, and Synthetic Biological Computing for Kaiser-Permanente

7 年

Yep, definitely a favorite of the hackers. I wonder what (if any) real deep dive assessment has been done on the the risks impacts to the broader private sector and more local governments around the period of QC transformation and maturity (the periods between 2018 to 2029) as this is when things will be really bad for the mass population. Fed Government areas like classified and highly classified/ top secret will be prepared, and so will Wall Street, JPMC, Google, etc. However, we're not all Wall Street, or the Pentagon, or Google, or a global bank.

回复

要查看或添加评论,请登录

Steve King, CISM, CISSP的更多文章

  • Connected Device Security: A Growing Threat

    Connected Device Security: A Growing Threat

    Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And as you have…

    3 条评论
  • China’s Ticking Time-Bomb.

    China’s Ticking Time-Bomb.

    It should now be clear to even the casual observer that China has been spying on us for years and stealing reams of…

    7 条评论
  • Comparing Major Crises To COVID-19: A Teachable Moment

    Comparing Major Crises To COVID-19: A Teachable Moment

    Lessons from past financial crises might prepare us for the long and short-term effects of COVID-19 on the economy and…

  • The Escalating Cyber-Threat From China

    The Escalating Cyber-Threat From China

    A Modern-day Munich Agreement In an article penned back in May of 2015 in a policy brief published by the Harvard…

    1 条评论
  • Cybersecurity: Past, present, future.

    Cybersecurity: Past, present, future.

    We have made a flawed assumption about cybersecurity and based on that assumption we have been investing heavily on…

    15 条评论
  • Three Marketing Tips for Improved Conversion Rates

    Three Marketing Tips for Improved Conversion Rates

    While we are all devastated to one degree or another by this outbreak and with the knowledge that it will likely change…

  • Coronavirus in the Dark.

    Coronavirus in the Dark.

    So, yes. It is now very clear that the outbreak of the COVID-19 virus and the concomitant investor panic leading to a…

    13 条评论
  • Panicky Investors Issue Dire Warning On Coronavirus

    Panicky Investors Issue Dire Warning On Coronavirus

    Sequoia Capital just issued a dire warning to its portfolio companies. “Coronavirus is the black swan of 2020.

    5 条评论
  • AI in Cybersecurity? Closing In.

    AI in Cybersecurity? Closing In.

    "AI Needs to Understand How the World Actually Works" On Wednesday, February 26th, Clearview AI, a startup that…

    8 条评论
  • Do CapitalOne Shareholders Have a Case Against AWS?

    Do CapitalOne Shareholders Have a Case Against AWS?

    An adhesion contract (also called a "standard form contract" or a "boilerplate contract") is a contract drafted by one…

    1 条评论

社区洞察

其他会员也浏览了