Keeping Up with the Cybercriminals

Keeping Up with the Cybercriminals

Matt Goche

Vice President of Global Security Services at Sungard Availability Services

Views 631

Keeping Up with the Cybercriminals

17.11.2016 10:00 am

What do supermarkets, video games and search engines have in common? They all belong to sectors that have seen major hacks over the last few years. The cyberattacks on Tesco BankingSony and Yahoo, are just some of the most public examples in demonstrating that the ‘hacker industry’ is continuing to gather strength, attacking vulnerabilities in both the public and private sector for profit.

From corporate industries and political groups, to universities and healthcare systems – even Twitter – no one is immune. And yet cyber security is still misunderstood, or worse, underestimated. Cyber criminals are becoming more creative; for each loophole we close or flaw we patch, hackers continually are finding new methods to beat defences.

As I scan the cyber horizon looking for emerging threats, here are just a few of the key areas at risk:

Web Applications:

Perhaps the area of highest risk, the threats to web applications are not new but they are increasing. Worryingly, we are seeing more malware targeted specifically at web applications, rather than aimed directly at end points, such as devices or users. 

The move towards cloud-based software means that more data than ever is available through the web, presenting a potentially low friction access point for hackers to gain entry to an organisation’s network.

Spear Phishing Attacks:

The second area that has seen a major increase is spear phishing attacks. Far more dangerous than the general phishing scams that have been prevalent since the mid-nineties, the new generation uses targeted attacks against specific organisations. They often include malware tailored for the victim’s organisation and which meet the hacker’s objective. 

To illustrate, a spear phishing attack may include malware specifically designed for a certain organisation’s end points, or some of the capabilities and applications within the target victim’s environments. These targeted attacks, when combined with the nature of the malware that’s sent, can be even more damaging.

The Internet of Things:

Although a relatively new phenomenon, the Internet of Things (IoT) – connected devices – is already being targeted by cyber criminals. There are a growing number of applications that aren’t built from traditional platforms, or unique commercial-off-the-shelf products (COTS) in the way you would normally think of COTS products. Instead, they are one-offs designed for a specific function and tend to have underlying systems that are fairly unique and have received limited vulnerability testing. 

In the recent past, the potential security vulnerabilities of IoT devices were not a main concern. However, with more and more malware being specifically designed to take advantage of the vulnerabilities of IoT appliances and their capabilities to access a network, not to mention botnets, IoT has quickly jumped up the CIO’s agenda.

Firmware:

Another area expected to see more attacks is at the firmware level. As organisations have moved to the cloud, much of the malware that’s been designed looks to attack within the container of the hosted tenant. For instance, as the hosted tenant migrates their standard operating systems and applications, the malware is deployed against those systems.

More attacks and malware specifically designed for one layer deeper are expected at either the firmware or the orchestration layer. The virtualisation layer could also be a target as it would potentially allow an attacker to compromise more than just the single container. The risk of such attacks has a massive impact on cloud vendors as well as other types of hosting providers.

What’s a Company to Do?

Businesses need to approach the security of their environments in a comprehensive manner, looking at every level of the technology stack to see where a potential new or existing vulnerability could originate and/or be exploited. Some of the proactive measures all organisations can follow to guard against any form of cyberattack:

  • Implement a Defence in Depth model  
  • Network edge security 
  • Invest in Intrusion Detection and Prevention software
  • Install robust firewalls including Web Application Firewalls 
  • Conduct regular vulnerability scans
  • Penetration testing
  • Safeguard VPN access 
  • Adopt a virtual desktop environment for remote devices.
  • Block users from installing unauthorised applications  
  • Insist on strong password controls for users  
  • Adhere to basic security doctrines  
  • Disable macro scripts  
  • Implement proxy internet access 
  • Segregate networks  
  • Backup regularly and verify the integrity of those backups 
  • Draw up an Information Security Policy 
  • Create an education programme for users 
  • Develop a practical incident response plan.

With so many moving parts and layers within the business, and so many routes towards ensuring the security of environments, networks, and applications, pairing with an expert security partner can help.  Not only can this augment resources, it means you have an army of knowledge on your side, ready to identify, take on and overcome the ever changing and emerging threat-scape all companies face.

Latest blogs

n/a n/a

Tips on How to Successfully Trade CFDs

A CFD or contract for difference is a financial product that allows a trader to speculate on asset classed without owning a portion of the underlying asset. A CFD trade is not an investment but high-risk speculation that carries the risk of losing Read more »

Patrick McKinney and Joe Fuchs Wolters Kluwer Finance, Risk & Regulatory Reporting

Building an Integrated Data Management System: A Guide for Digital Banks

Digital banks and other FinTechs are emerging as more nimble competitors to established legacy banks. The digital banks that are on their way to becoming fully chartered have the opportunity to setup fully automated processes and systems without Read more »

n/a n/a

How COVID-19 Is Ushering In a New Era of Cashless Technology

  Image source: https://www.pexels.com/photo/person-shopping-online-3944405/   Cashless technology isn't a completely fresh concept. People have been using credit cards for decades, and the market for fintech services has been Read more »

Jean Shin tyntec

Using WhatsApp for 2FA is the Future of Banking

From user authentication and password resets to transaction verification, two-factor authentication (2FA) offers basic but useful protection for consumers. The 2FA process typically sends an SMS sent to the customer with a one-time password (OTP). Read more »

Amir Ghodrati App Annie

The Role of Fintech Apps in Navigating This Period of Financial Insecurity

Economic instability has been ricocheting throughout the stock market in the wake of the global coronavirus pandemic. Its effects have been felt across all industries, with winners and losers’ across different sectors. So, how has fintech Read more »

Related Blogs

Gary Wright B.I.S.S. Research

Cyber crime challenge

At todays Innovation Finance event that was wonderfully attended and organised the topical issue of Cyber crime was presented. It amazed me that there are so many new vendors producing imaginative system solutions that cover cyber crime protection Read more »

Magazine
ALL
Free Newsletter Sign-up
+44 (0) 208 819 32 53 +44 (0) 173 261 71 47
Download Our Mobile App
Financial It Youtube channel