Cyber-Security in 120 Secs: 2014 Yahoo Breach = Cyber-Espionage

Yahoo Breach.png

 This week, the roots of the 2014 Yahoo breach was linked to a "nation-state" cyber-espionage attack;  which brings us to a survey that conclude that the top concern for businesses is cyber-espionage and  ransomware was the most common cyber attack;  which leads us to the shift of ransomware hitting IoT's.






1.  The Department of Justice is pointing to cyber-espionage for the record breaking Yahoo data breach of 2014. 

Why is this signficant?

  • In 2016, Yahoo disclosed 2 separate breaches; one that occurred in 2014- affecting over 500 million users and the second breach that occurred in 2013-affecting over 1 billion users. Ultimately, the breaches affected the cost of Yahoo acquisition – Verizon took $350M off their offer. Marissa Mayer, Yahoo CEO, lost her annual bonus.
  • The DOJ and FBI investigated the breach and concluded the 2014 Yahoo breach to be “state sponsored” attack.  As with other state sponsored attacks, this indictment poses a question on liability post-attribution- while 4 individuals were indicted, there has only been one arrest given that the other 3 reside in Russia. Given the international scope, it’s not certain that the accused will ever be tried in US court.
  •  “Cyber crime poses a significant threat to our nation’s security and prosperity, and this is one of the largest data breaches in history… The United States will vigorously investigate and prosecute the people behind such attacks to the fullest extent of the law.” Attorney General Session.

Read the full story on TechCrunch

 Read the full story on TechCrunch





2.  Cyber-espionage is a top concern for businesses

Why is this signficant?

  • The influence of current headlines may have shifted top concerns from targeted attacks and ransomware to be more concerned about cyber-espionage.
  • In TrendMicro’s survey, it concluded that 20% of respondents were concerned with targeted attack. The most common attack was ransomware hitting 78% of respondents.
  • Businesses are continuing to struggle to defend against the constant evolving threat landscape. According to the survey, lack of understanding of latest threats and unpredictable cyber-criminals are the greatest challenge.                            

//**Overwhelmed by the evolving threat landscape and how to address it? Read here how to best evaluate your endpoint security solution to effectively protect against advanced attacks**//

Read the full story in InfoSecurity Magazine



Ransomware is now shifting to IoT’s.

Why is this signficant?

  • “As many as 21 billion devices used by businesses and consumers around the world are forecast to be connected to the internet by 2020.” These IoT devices are certainly attractive to attackers as they contain sensitive personal and confidential info.
  • Currently, the fitness trackers, smarTV’s, smart watches, baby monitors and all other connected devices are mass produced without much security built-in making these products vulnerable to ransomware, as well as other cyber-attacks. This becomes a problem for enterprises since these IoT devices are mostly a BYOD-connected devices. Worse yet, given the variety and different flavors of IoT devices, makes IoT devices unmanageable and hence unsecured. 
  • The realization is that blocking the access to the data is not valuable for re-sell on the dark web. Can you imagine being locked out of your cell phone, smarTV, FitBit or other connected devices. Would you pay the attacker to retrieve the data?

Read the full story in BBC News


SANS review of ensilo



tag cloud