Charles Leaver – With Russian Hackers Stealing Huge Amount Of Information You Must Defend Your Organization With Continuous Endpoint Monitoring

By | April 17, 2015

Charles Leaver Ziften CEO

It is thought that the greatest recognized cyber attack in the history of data breaches has actually been discovered by an American cyber security business. It is thought by the company that a group of cyber bad guys from Russia that they have actually been examining for numerous months is accountable for stealing passwords in the billions and other sensitive individual data. It is declared that the Russian group stole 4.5 billion credentials, although a lot were duplicated, and the end result was 1.2 billion unique data profiles being stolen. The group took the information from 420,000 sites of different sizes, from large brand name websites to smaller mom and pop stores.

The New York Times stated that the cyber wrongdoers comprised of about 12 people. Starting out with small scale spamming methods in 2011 they gained the majority of the data by buying stolen databases.

In an interview with PCMag, the creator of the company that found the breach, Alex Holden, said “the gang started by just buying the databases that were readily available online.” The group used to acquire at fire sales and were described as “bottom feeders”. As time progressed they started the purchase of higher quality databases. It’s sort of like graduating from stealing bicycles to stealing pricey automobiles.”

A Progression From Spamming To Utilizing Botnets

The cyber criminal team started to alter their habits. Botnets were used by the group to gather the stolen credentials on a much bigger scale. Through making use of the botnets the group were able to automate the process of determining websites that were susceptible and this allowed them to work 24/7. Anytime that a contaminated user would go to a site, the bot would inspect to see if the vulnerability would could go through an SQL injection automatically. Utilizing these injections, which is a frequently used hacking tool, the database of the website would be forced to reveal its contents through the entering of a simple query. The botnets would flag those sites that were susceptible and the hackers returned later on to extract the info from the website. Using the bot was the ultimate failure of the group as they were discovered by the security company utilizing it.

It is thought by the security company that the billions of pieces of data that were taken were not stolen at the same time, and that the majority of the records were most likely purchased from other cyber wrongdoers. According to the Times, very few of the records that were taken have actually been sold online, rather the hacking group have decided to use the info for the sending out of spam messages on social media for other groups so that they can earn money. Different cyber security specialists are asserting that the magnitude of this breach signifies a trend of cyber wrongdoers stockpiling big quantities of personal profiles in time and saving them for use later on, according to the Wall Street Journal.

Security analyst at the research study firm Gartner, Avivah Litan, stated “companies that rely on user names and passwords have to develop a sense of urgency about altering this.” “Till they do, wrongdoers will simply keep stockpiling individuals’s credentials.”

Cyber attacks and breaches on this scale underline the need for organizations to protect themselves with the most recent cyber security defenses. Systems that utilize endpoint threat detection and response will help organizations to produce a clearer picture of the dangers facing their networks and receive information that is actionable on how best to resist attacks. Today, when big data breaches are going to happen more and more, making use of continuous endpoint visibility is crucial for the security of a company. If the network of the organization is constantly monitored, hazards can be identified in real time, and this will minimize the damage that a data breach can inflict on the reputation and bottom line of a company.

 

Leave a Reply

Your email address will not be published. Required fields are marked *