U.S. companies are currently experiencing annual losses of more than $525 million due to cybercrime, with the majority of these losses stemming from malicious code and denial of service attacks.
And the extent of cyberattacks is not confined to companies. The list of high profile CEOs whose accounts have been compromised this year is long. Mark Zuckerberg’s Twitter and Pinterest accounts have been hacked, apparently due to a LinkedIn password leak 5 years ago.
Additionally, the Twitter accounts of Google’s CEO Sundar Pichai and Brendan Iribe, co-founder of Oculus VR, have been compromised. The latest addition to this list is Jack Dorsey, the CEO of Twitter himself. Most of those attacks were no straight forward brute force attacks, but were executed indirectly. In Pichai’s case, tweets were sent via an old Quora account that apparently had been linked to Twitter. It seems like in Dorsey’s case, tweets were sent via Vine.
Overall, large businesses that experienced a cyberattack saw an average of 3.6 successful attacks each. In the last five years, Symantec, the software security firm, saw a steady increase in attacks targeting businesses with less than 250 employees, with 43% of all attacks targeted at small businesses in 2015, proving that companies of all sizes are at risk. It’s not just Fortune 500 companies and nation states at risk of having IP stolen—even the local laundry service is a target. In one example, an organization of 35 employees was the victim of a cyberattack by a competitor. The competitor hid in their network for two years stealing customer and pricing information, giving them a significant advantage.
This serves as a clear warning that all businesses are potentially vulnerable to targeted attacks. In fact, spear-phishing campaigns targeting employees increased 55% in 2015. No business is without risk. Attackers motivated purely by profit can be just as technically sophisticated and well-organized as any nation state-sponsored attackers.
According to root9B, a cybersecurity startup in Colorado Springs, CO, a hacker who infiltrated a computer network on Jan. 1 would typically operate unnoticed until August 17—229 days on the inside, stealing data and spying. It is like a burglar breaking into your home and living there for over seven months before being detected.
Old methods are ineffective
The current conventional approach of building an automated digital wall to prevent attackers from breaching one’s system clearly is not working. This may explain the rise of firms like root9B that have come up with countermeasures. Staffed by former military and other intelligence experts at the National Security Agency (NSA) and CIA, root9B identifies and shuts down adversaries in action, often within days of a breach.
Using something called their HUNT technique, which has been honed through cyber operations and training both within the Department of Defense and commercial community, the firm uses agentless software to patrol and monitor an adversary without the attacker being aware that he is being watched. This state-of-the-art defensive network method is a bit like the submarine chase depicted in the film, Hunt for Red October. The Soviet nuclear submarine Red October was closely followed by the American nuclear sub Dallas without Red October being aware for most of Dallas’ existence.
“The analogy is a good one,” says CEO Eric Hipkins, “except in our cyber world, there is no need for a Dallas following the adversary. We use agentless detection capability, thus we are invisible to the attacker.”
No doubt, for this reason, root9B has been named the No. 1 firm on Cyber Security 500’s annual ranking of innovators—ahead of IBM, Cisco and other tech giants. The five-year-old company relies on “manned information security.” Its analysts engage in code-to-code combat with cyber attackers inside corporate and government.
Hipkins advises CEOs to train actively for defense and offers the following suggestions.
1. Most organizations view cybersecurity as a cost center within the organization. CEOs should think of a strong/effective cybersecurity program as “protecting future revenue,” not as a cost center.
2. It is important for today’s CEOs to recognize that automation alone will not solve the cyber problem or protect them from an adversary. This flies in the face of decades of IT development, computer science, and cyber product sales in the commercial sector. The adversary lives with automated technology, tests it, reverse engineers it, and understands its features, weaknesses, limitations, and vulnerabilities.
3. CEOs should be thinking about cybersecurity risk during mergers and acquisitions. Not only are network vulnerabilities and weaknesses being introduced, but these events present opportunities for adversaries to target the business and leverage the merger as a way to gain access to a hard/closed network.
4. As a follow-on, CEOs should be looking for threat “knowledge” vs. “data” when trying to protect their business. There are a lot of threat data sources on the market today, but these are not tailored to a client or their specific business.
Adversaries find and exploit the gaps in defenses that rely solely on automated tools. Firewalls, security sensors, telemetry tools, and post-incident response protocols are no match for them. The only effective counter is another human being who stands in opposition to the adversary’s malicious activities.
By: J.P. Donlon