Why Are Corporations Still Experiencing Data Breaches?

Posted on behalf of Arnold Law Firm in
circuit board with data breach iconsIn the digital age, corporations need to take extra precautions to secure their information, including sensitive client information. While cybersecurity measures have come a long way, there are still many vulnerabilities being exploited by bad actors. Below, we discuss some of the steps these bad actors take to breach a corporation’s internal services and what they do once they gain access. If you have received a notification of a data breach from any company, you should strongly consider speaking to our data breach lawyers in Sacramento as soon as possible to learn more about protecting your information and what legal options may be available to you to recover compensation.

How Are Data Breaches Still Occurring?

As corporations have begun putting more emphasis on cybersecurity, bad actors hoping to access their information have also started ramping up their own efforts to overcome these security measures. Microsoft recently released updated information on a large-scale social engineering and extortion campaign that provides some insight into how some of these bad actors gain access to an internal system and use other methods to extract the information they want for financial gain.

Initial Access

There are a variety of methods used by these entities to obtain passwords and other credentials necessary to gain access to a company’s internal systems. Some of these methods include:
  • Deploying malicious Redline password stealers
  • Purchasing credentials and session tokens from criminal dark web forums
  • Paying employees within the targeted organization to access credentials and multi-factor authentications
Microsoft also discovered that these entities often first gain access to employees’ personal devices, which are often used for password recovery or multi-step authentication, to gather information to access the company’s system. In a process called “SIM-swapping” attackers gain access to a user’s phone number before signing into the corporate network. This can be used to handle phone-based authentication prompts to gain access to the target company. Some entities are brash in their efforts and even post advertisements on social media or web forums looking for insiders who are willing to sell company information.

Reconnaissance

Once access is obtained, other tactics are used to extend the scope of that access, including:
  • Taking advantage of unpatched vulnerabilities on internal servers
  • Searching codes and platforms for additional credentials and sensitive information
The reconnaissance process allows the bad actor to spy on the internal server to see which accounts have higher privileges. Once those high-ranking accounts are identified, the bad actor goes after that account using some of the same processes as before, but also uses internal communication channels, like Teams and Slack, to escalate access. The process keeps going until the highest level of access is reached.

Extortion

The purpose of bad actors accessing internal corporate servers is monetary gain. Bad actors’ plan once they have gained all access is to download all the necessary sensitive information and lock out the legitimate account holders for the purpose of extortion. The bad actors frequently threaten public release of the sensitive information if a ransom is not paid by the corporation, but the attack does not stop there. Microsoft has also observed some bad actors using the initial access and control of internal systems to also gain access to crisis communications to see how the corporation is responding to the attack.

Impact

Entities in various industries have been hacked by these bad actors, including:
  • Retail
  • Healthcare
  • Manufacturing
  • Higher education
  • Energy production
  • Telecommunication
  • Government entities
  • And more
The more companies are impacted by these security breaches, the more likely your information is vulnerable. If you have received a notification of a data breach, call the Arnold Law Firm today.

What Are the Recommendations to Prevent a Breach?

There are some steps corporations should be taking to help prevent data breaches, including the following:
  • Strengthening Two-Step Authentication
  • Using modern and up-to-date hardware
  • Strengthening virtual security measures
  • Educating employees on preventative measures
  • Using modern authentication options for Virtual Private Networks (VPN)
The Federal Trade Commission has also released a guide to help businesses that are affected by data breaches.

How Businesses May Be Liable for Data Breaches

Despite a corporation’s role as the victim in a data breach, if client information is exposed in the breach the company could be held liable for damages. Liability may fall to the company if there was a lack of security either by the company’s own cybersecurity personnel or that of a third-party vendor in charge of security.

Was Your Information Exposed in a Data Breach? Call Us Today

Every data breach case is different, so it would be in your best interest to speak to an attorney if your information was exposed in a data breach. We offer a free consultation to discuss your claim and see what legal options may be available to you.

Call 916-777-7777 to learn more.

Settlement - $3,767,000

Truck Accident

A 20-year-old man who had been married for just 12 days left home on his way to work. He was driving on Pleasant Grove Road in Sutter County in the early morning when he came upon a slow-moving truck. As he pulled out to pass the truck, the truck driver turned left in front of him. The young man attempted to steer back into his lane but his vehicle struck an un-flagged piece of metal extending from the back of the truck. He died in the resulting crash.

Expert witnesses brought in by the Arnold Law Firm proved that the truck, owned and operated by a hauling firm, should never have been on the highway that morning. Specifically, the rear and side turn signals did not work and the rear-view mirror was in a poor state of adjustment at the time of the collision. As a result, the driver, who had failed to properly inspect the vehicle before setting out that morning, couldn’t see the young man’s vehicle as it attempted to pass.

The poor condition of the truck, its lack of maintenance and the manner in which it was operated were found to be substantial factors in causing the collision that killed the young man. The testimony also established that the man had been making a lawful pass at the lawful speed limit and acted reasonably when he attempted to avoid the collision.

The man’s 20-year-old widow was awarded $3,767,000.77, his parents were awarded $185,131 and the family was reimbursed $11,899 in funeral expenses. Though money is a poor substitute for a young man’s life, this verdict demonstrates that drivers who endanger the lives of others will be held accountable for their actions.