Is Your CEO a Cybercrime Target?
You and your systems may be all that stand between your boss and a vicious, targeted cyberattack.
Computerworld - A CFO at a Fortune 1000 company holds his cursor over an e-mail that appears to be from a direct report. In reality, it's from someone he's never met, a criminal who's targeted and stalked the highly compensated executive, searching through company SEC filings and compiling personal details through corporate and social networking sites.
Now the cybercriminal is in position to launch an attack that will allow him to mine the CFO's hard drive for credit card numbers, passwords to corporate databases or other proprietary information.
In one click, the CFO is going to have himself a big problem. If you're his IT manager, you're going to have one too.
If Viagra-touting spammers and credit card phishers are the carpet-bombers of computer crime, so called C-level attackers are the snipers. They mine information from a relatively small number of wealthy or high-status individuals in positions of power.
The treasure sought is corporate and/or personal data, both of which can be extremely lucrative. The hackers can use the information they garner to wreak further havoc elsewhere or, more likely, they will sell it and resell it for profit through online underground servers.
These types of targeted C-level attacks are rare, but they're on the rise, and they're sophisticated enough to make the average IT manager's blood run cold.
Following the Money Trail
C-level attacks "started out about a year ago in very low numbers but have been ramping up since," reports Matt Sargeant, senior antispam technologist for MessageLabs Ltd., a New York-based security services provider.
Last summer 24-year-old Russian Igor Klopov and four others were indicted by a New York grand jury for stealing $1.5 million and attempting to steal another $10.7 million from more than a dozen wealthy victims. Klopov used the Forbes 400 list of the world's wealthiest people to pick his marks. They included Texas businessman Charles Wyly and Anthony Pritzker, president of TransUnion Credit (and member of the prominent Pritzker clan of Hyatt Hotel fame.)
The government charges that Klopov found information on some of his victims' real estate holdings and lines of credit -- much of which was publicly available -- and used it to build dossiers on them. He used Monster.com, CareerBuilder.com and similar employment sites to recruit accomplices.
The gang created and used fake IDs to contact the victims' financial institutions (JPMorgan Chase, Merrill Lynch and Fidelity Investments) to try to gain information on their accounts, get duplicate checkbooks and the like. The institutions flagged the attempts and contacted the authorities.
An IT manager at a Fortune 500 financial institution says his company, too, was recently affected by a C-level attack. In this instance, a bank executive's laptop was hacked while he was working from home. The hacker captured passwords and log-ins and tried to access some of the bank's accounts. The attempt, which was later traced to a Russian IP address, failed, says the source, who spoke on condition of anonymity.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts