How Are Data Breaches Still Occurring?
As corporations have begun putting more emphasis on cybersecurity, bad actors hoping to access their information have also started ramping up their own efforts to overcome these security measures. Microsoft recently released updated information on a large-scale social engineering and extortion campaign that provides some insight into how some of these bad actors gain access to an internal system and use other methods to extract the information they want for financial gain.Initial Access
There are a variety of methods used by these entities to obtain passwords and other credentials necessary to gain access to a company’s internal systems. Some of these methods include:- Deploying malicious Redline password stealers
- Purchasing credentials and session tokens from criminal dark web forums
- Paying employees within the targeted organization to access credentials and multi-factor authentications
Reconnaissance
Once access is obtained, other tactics are used to extend the scope of that access, including:- Taking advantage of unpatched vulnerabilities on internal servers
- Searching codes and platforms for additional credentials and sensitive information
Extortion
The purpose of bad actors accessing internal corporate servers is monetary gain. Bad actors’ plan once they have gained all access is to download all the necessary sensitive information and lock out the legitimate account holders for the purpose of extortion. The bad actors frequently threaten public release of the sensitive information if a ransom is not paid by the corporation, but the attack does not stop there. Microsoft has also observed some bad actors using the initial access and control of internal systems to also gain access to crisis communications to see how the corporation is responding to the attack.Impact
Entities in various industries have been hacked by these bad actors, including:- Retail
- Healthcare
- Manufacturing
- Higher education
- Energy production
- Telecommunication
- Government entities
- And more
What Are the Recommendations to Prevent a Breach?
There are some steps corporations should be taking to help prevent data breaches, including the following:- Strengthening Two-Step Authentication
- Using modern and up-to-date hardware
- Strengthening virtual security measures
- Educating employees on preventative measures
- Using modern authentication options for Virtual Private Networks (VPN)
How Businesses May Be Liable for Data Breaches
Despite a corporation’s role as the victim in a data breach, if client information is exposed in the breach the company could be held liable for damages. Liability may fall to the company if there was a lack of security either by the company’s own cybersecurity personnel or that of a third-party vendor in charge of security.Was Your Information Exposed in a Data Breach? Call Us Today
Every data breach case is different, so it would be in your best interest to speak to an attorney if your information was exposed in a data breach. We offer a free consultation to discuss your claim and see what legal options may be available to you.Call 916-777-7777 to learn more.