Navigation Links
Recently Exposed Cyber Attacks Show Hackers Scoring Huge Victories in Critical US Sectors
Date:5/14/2013

New York, NY (PRWEB) May 14, 2013

May is not even half over and already there have been some massive cyber attacks making headlines this month, with two being especially frightening. First up was a three-year long cyber intrusion that compromised massive amounts of data from a military defense contractor, QinetiQ North America. They only have their fingers in areas like satellites, drones, robotics, military software and other high-tech gadgets the US military depends on to maintain dominance. The second involved two intricately orchestrated and sophisticated attacks involving the banking sector and ATMs that netted $45 million in cash in roughly ten hours, carried out with precision coordination that spanned over two dozen countries. Joe Caruso, CEO/CTO of Global Digital Forensics (GDF), took some time to discuss the implications of such breaches and the importance for any organization to keep their cyber security posture current.

A very big deal

“If there are two industries that raise the hair on my arm when I think about them getting breached by cyber attackers, it’s military defense and the financial sector. When nefarious players manage to take control of these types of digital assets, it doesn't just have the potential to topple a company, it could topple a nation, and more.”

Not with a bang, but a whimper

“Hackers had access to QinetiQ’s data on and off for three years. Think about that. Their experts said the intruders had access to virtually everything over the longevity of the attack. So basically, the secrets to all this cutting-edge technology our nation depends on for security and stability, whether already deployed or still in the developmental phase, has been compromised, which means potential enemies now have the recipe and all the ingredients they need to make Kryptonite. And if that happens, the shock-and-awe of our next military engagement may quickly turn into shock and awe on our part when our “superior technology” is neutralized right out of the gate.”

Out of control

“As far as the $45 million cyber heist goes, the most disturbing thing to me is not that they executed the plan with such precision, or had access to “live” account credentials with substantial funds, or even that they had boots on the ground around the world to collect the actual cash, that’s all been done to some degree for years. What got my attention is that they were able to manipulate internal controls that reset limits and other protection features. And that’s a very big deal. Like Rothschild said, “Give me control of a nation's money and I care not who makes it's laws.” So I think it’s pretty self-evident that constant vigilance on the cyber security front is not a luxury, it’s a paramount responsibility for every organization doing business online or relying on digital assets with value to cyber attackers, and that includes just about everybody these days. Because even a small business can be a springboard for attackers to gain access to larger organizations through their vendor and/or client connectivity with them.”

Understanding today’s cyber threat landscape is crucial

“With every organization having its own unique footprint in the digital world, it’s only logical that the cyber threat landscape each faces is unique as well. Our cyber threat assessments are designed to take out the guesswork about what kind of threats should be on an organization’s radar, and uncover areas of weakness regarding cyber security policies and procedures as they relate to an organization’s digital architecture. So, for instance, if they have a BYOD (Bring Your Own Device) policy in effect, the threats that can come from the mobile side of the house, like smartphones and tablets, must be scrutinized, as well as the cross platform relationships and interactions with the ESI (Electronically Stored Information) that can be accessed. And it’s important to do this regularly, because as threats evolve, and they always do, what was effective yesterday may have serious deficiencies today.”

Simulating real world attackers

“Another component which is very effective at uncovering weakness in cyber defense is penetration testing. We take on the role of real-world attackers and launch attacks using the same tradecraft and tenacity today’s cyber intruders use. From phishing and spear phishing campaigns, to all sorts of social engineering tricks to breach physical levels of security, like air-gaps used when segmenting critical internal systems from more vulnerable outward-facing networks, we will attempt to gain access to credentials, systems and data and/or attempt to deliver “GDF infected” payloads, which thus far we have never failed to do. It’s an eye-opening experience which has a long lasting effect as far as keeping cyber security on everyone’s mind. Once an employee, manager or executive can be called out as a weak link, it’s something that isn’t easily forgotten. Once all the results are in and analyzed, we can work hand in hand with an organization to start closing the holes and stopping the relevant threats.”

Breach Response and Remediation

“The ramifications of a successful cyber assault don't end with the intrusion, regulatory compliance agencies are also waiting their turn to add insult to injury. With stricter regulation and pursuit through Sarbanes-Oxley (SOX), HIPPA, PCI, GLB and other legislation, it is imperative that organizations have a cyber emergency incident response plan in place. GDF and its global network of Emergency Response Teams (ERTs) can be on site in matter of hours to isolate, secure and investigate security breaches. We are very good at helping organizations put out the fires that can come from even a single successful cyber intrusion, including the hits that trust and credibility can take from a client, vendor and investor perspective.”

*Global Digital Forensics is a recognized industry leader in the fields of computer forensics, electronic discovery (eDiscovery), cyber security and emergency incident response, with years of experience assisting clients in the government, banking, healthcare, education and corporate arenas. For a free consultation with a Global Digital Forensics specialist, call 1-800-868-8189 about tailoring a plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical if a cyber incident has occurred, so don’t hesitate to get help. For more information, visit http://www.evestigate.com.

Read the full story at http://www.prweb.com/releases/2013/Defense-Financial-Breach/prweb10729275.htm.


'/>"/>
Source: PRWeb
Copyright©2012 Vocus, Inc.
All rights reserved

Related medicine news :

1. hCGTreatments / Diet Doc hCG Diets & Weight Loss Plans Targets America’s Teen Obesity Epidemic With Recently Improved hCG Diet Plans
2. NewsWatch, a National Television Show, Recently Aired a Segment Featuring I, Gladiator, a Popular Swipe Battle Game for iOS Mobile Devices
3. Mesothelioma Victims Center Now Urges Family Members Of A Loved One Who Has Recently Died From Mesothelioma To Call Them If Compensation Options Were Never Pursued
4. Improved hCG Diets From hCGTreatments / Diet Doc hCG Diets & Weight Loss Plans Teach Patients How to Lose Weight, Recently Linked to Weight Discrimination
5. Kinesiology Tape Recently Launched by the SCHUPP Company Activates the Body to Heal Itself
6. Website Reviewing Brazilian Butt Lift Workout Recently Launched
7. How to Get Speeding Tickets Dismissed in California, a Service by Ticketbust Recently Reviewed by Nationwide Television News Show, NewsWatch
8. Dog Sniffs Out Breast Cancer of Susan Castriota, Author and Illustrator of Anti Bully Children’s Book as Recently Aired on WTAE Pittsburgh
9. Feds Recently Freeze Travel Reimbursements for 2013
10. HeroClix, a Fun App using Comic Book Characters, was Recently Featured on the AppWatch Segment of NewsWatch
11. Mary Newswanger, from FullPowerLove.com, was Recently Nationally Featured on ABC, NBC, Fox, & LA Daily News Regarding Planet Friendly Technologies
Post Your Comments:
*Name:
*Comment:
*Email:
(Date:10/13/2017)... ... October 13, 2017 , ... Lori R. Somekh, founder of the ... national organization of elder law and special needs planning attorneys. “Membership in ElderCounsel helps ... provides a forum to network with elder law attorneys nationwide,” said Somekh. , ...
(Date:10/13/2017)... ... October 13, 2017 , ... Ellevate Network, the leading network for professional ... action towards gender equality at their inaugural Summit in New York City in June. ... a social audience of over 3 million. To watch the Mobilize Women video, ...
(Date:10/13/2017)... Fairfax, VA (PRWEB) , ... October 13, 2017 ... ... provider of DevOps and Agile Software Development, has been awarded a contract by ... (EATS) Blanket Purchase Agreement (BPA) aims to accelerate the enterprise use of Agile ...
(Date:10/12/2017)... ... October 12, 2017 , ... CitiDent ... sleep apnea using cutting-edge Oventus O2Vent technology. As many as 18 million ... by frequent cessation in breathing. Oral appliances can offer significant relief to about ...
(Date:10/12/2017)... ... October 12, 2017 , ... The American College of Medical Informatics ... PhD, FACMI, during the Opening Session of AMIA’s Annual Symposium in Washington, D.C. AMIA’s ... of Morris F. Collen, a pioneer in the field of medical informatics, this prestigious ...
Breaking Medicine News(10 mins):
(Date:9/18/2017)... 2017 EpiVax, Inc. ("EpiVax") a ... immune engineering, today announced a new NIH-funded ... ... and presents a challenge for traditional flu ... be effective. Using state-of-the-art bioinformatics and molecular modeling methods, ...
(Date:9/12/2017)... , Sept. 12, 2017   EcoVadis , the leading platform ... published the first annual edition of its Global CSR Risk and Performance ... evaluated by EcoVadis, based on Scorecard Ratings that analyzed nearly 800,000 data ... ... ...
(Date:9/12/2017)... 12, 2017  ValGenesis Inc., the global leader ... pleased to announce the appointment of Dr. ... Board of Directors and Chairman of Advisory Board ... science companies to manage their entire validation lifecycle ... in this process. Furthermore, ValGenesis VLMS enables rigorous ...
Breaking Medicine Technology: