title-image
Cybercrime

Russian Group Hacking: What We Know and What We Can Learn

It has been reported by Hold Security that a Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses. At this stage it is unknown what the attack vector was, but it is likely to be a combination of different methods including malware and app based attacks.

With such a vast amount of personal information being stolen, it is entirely possible that complete identity fraud can be carried out by the hackers, even without credit card details. Nowadays hackers actually get more value out of personal information as opposed to credit card details. In fact, one article even points out that Twitter account information is of more worth to a hacker than their credit card.

As we have seen in the news, especially with the European Central Bank Hacking, these types of attacks and the market for this information is growing and is almost becoming legitimised in some circles.

With this in mind, we have to look at what we are protecting here. Are we protecting the network or the data? It is clear that we need to protect the data and the applications that contain the data. It is not enough to just protect the network. We need to realise that we have to move our security approach to an application-centric security model. It is no longer good enough to protect the perimeter, or even the device. If the last 12 months have shown us anything, it is that these hackers are very resourceful. At the moment the applications, attacked via malware, zero day exploits and plain old application attacks, SQL injection etc., are the low hanging fruit. Until we fix this, we will see this market continue to grow.

It is also worth noting that these hackers, unless they are specifically interested in a specific company for espionage etc., will move onto a new target if their chosen one is too difficult to compromise. So in terms of protecting yourself, you only have to make your apps more difficult to compromise than your neighbours’ and you will be in a better position than you are today. There is no quick fix, but we need a change in how we perceive risk and what we choose to protect. Recent evidence and articles would suggest that we need to protect the applications.

 

Gary Newe is Sr. Systems Engineering Manager at F5 Networks

PREVIOUS ARTICLE

« Why Corporations Must Help Lead the Education Charge

NEXT ARTICLE

The Computerisation "Work Ethic" »
author_image
IDG Connect

IDG Connect tackles the tech stories that matter to you

  • Mail

Recommended for You

International Women's Day: We've come a long way, but there's still an awfully long way to go

Charlotte Trueman takes a diverse look at today’s tech landscape.

Trump's trade war and the FANG bubble: Good news for Latin America?

Lewis Page gets down to business across global tech

20 Red-Hot, Pre-IPO companies to watch in 2019 B2B tech - Part 1

Martin Veitch's inside track on today’s tech trends

Poll

Do you think your smartphone is making you a workaholic?