Malware vs Corporate Data, An Overview

Malware vs Corporate Data

At the backdrop of the recent PGA Championship season, ransomware had a very surprising role play, to infect the computers used by the PGA for running the tournament. If such big tournament organizer can get their employees to click the wrong link and execute a copy of a trojan, what now for an ordinary computer user? The reality is ransomware is a big money-making endeavor for cybercriminals, people are attached to their data. The moment accessibility to the data is cut, all hell breaks loose unless the victim has a credible backup solution that can reverse the data loss.

The ultimate goal of the information security process is to protect three unique attributes of information. They are:

  • Confidentiality – Information should only be seen by those persons authorized to see it. Information could be confidential because it is proprietary information that is created and owned by the organization or it may be customers’ personal information that must be kept confidential due to legal responsibilities.
  • Integrity – Information must not be corrupted, degraded, or modified. Measures must be taken to insulate information from accidental and deliberate change.
  • Availability – Information must be kept available to authorized persons when they need it.

Ransomware infection basically renders the three attributes non-existent. Companies are expecting their data to be confidential, has integrity and available when they need them. All of which are erased by ransomware, the virus author’s motivation is to hold the data hostage until a certain amount is paid, something many victims already did. The WannaCry ransomware of 2017 earned cybercriminals an estimated $4 billion worth of ransom. It speaks volumes of how profitable virus authorship became in our highly advanced Internet-connected world.

The attacker’s incentives are part of a larger underground economy. Broadly speaking, the actors in this economy are those selling attack services and heavily invested to penetrate the information stored on remote servers. We have entered the age where cyber defense spending is no longer a luxury for a Fortune 500 company, but rather a necessity for all business types, regardless of the sector they are operating.

Insight into the underground cyber-economy of attackers potentially yields pressure points on which to focus security efforts. For example, the sellers of attack services must publicize the availability of their services in an appropriate marketplace, and it may be possible to target the sellers themselves. It may also be possible to interfere with the operation of the marketplace itself, by shutting down the various marketplace venues or by poisoning them so that buyers and sellers cannot trust each other.

There is an ecosystem that exists between the cybercriminals and the potential victims, and if the latter will always be a prey until a credible cyber defense solution is rolled-out. Another new form of industry that helps corporate Internet and computer users are the Penetration Testing sector, a new business model of offering to “hack” a computer and network system, simulating what a cyber attack does for-hire. It is a new concept where a few companies sign-up for. But it is expected to grow by leaps and bounds, as a simulation of a cyber attack reveals weaknesses in the system, which can be patched and corrected. This enhances the security of the organization, as prevention of cybersecurity issues is much better than fixing a broken reputation and damaged brand caused by a real cyber attack.

Kevin Jones431 Posts

Kevin Jones, Ph.D., is a research associate and a Cyber Security Author with experience in Penetration Testing, Vulnerability Assessments, Monitoring solutions, Surveillance and Offensive technologies etc. Currently, he is a freelance writer on latest security news and other happenings. He has authored numerous articles and exploits which can be found on popular sites like hackercombat.com and others. He holds prestigious certifications like OSWP, OSCP, ITIL. His goals in life are simple - to finish her maiden business venture on Cybersecurity, and then to keep writing books for as long as possibly can and never miss a flight that makes the news.

0 Comments

Leave a Comment

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register