Thursday, March 28, 2024
No menu items!
spot_imgspot_imgspot_imgspot_img
Ad

Top 5 This Week

bama cap

Related Posts

Cybercriminals are now using telcos employees to access networks

I though insider jobs and conspiracy theories transpire in movies and books. These are activities that most organizations and individuals shy away from because the implications are always tragic. Although, security experts released a report claiming that cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, recruiting disaffected employees through underground channels or blackmailing staff using compromising information gathered from open sources.

Employees do the job.

According to the experts, attackers engage or entrap telecoms employees by Using publically available or previously stolen data sources to find compromising information on employees of the company they want to hack. They then blackmail targeted individuals – forcing them to hand over their corporate credentials, provide information on internal systems or distribute spear-phishing attacks on their behalf.

- Ad -

Another way is by recruiting willing insiders through underground message boards or through the services of “black recruiters”. These insiders are paid for their services and can also be asked to identify co-workers who could be engaged through blackmail.

The blackmailing approach has grown in popularity, following online data breaches such as the Ashley Madison leak, as these provide attackers with material they can use to threaten or embarrass individuals. In fact, data-leak related extortion has now become so widespread that the FBI issued a Public Service Announcement on 1 June warning consumers of the risk and its potential impact.

- Ad-

Telecommunications providers are a top target for cyber-attack. They operate and manage the world’s networks, voice and data transmissions and store vast amounts of sensitive data. This makes them highly attractive to cybercriminals in search of financial gain, as well as nation-state sponsored actors launching targeted attacks, and even competitors.

According to the Kaspersky Lab researchers, if an attack on a cellular service provider is planned, criminals will seek out employees who can provide fast track access to subscriber and company data or SIM card duplication/illegal reissuing. If the target is an Internet service provider, the attackers will try to identify those who can enable network mapping and man-in-the-middle attacks.

- Ad -

“The human factor is often the weakest link in corporate IT security. Technology alone is rarely enough to completely protect the organisation in world where attackers don’t hesitate to exploit insider vulnerability. Companies can start by looking at themselves the way an attacker would. If vacancies carrying your company name, or some of your data, start appearing on underground message boards, then somebody, somewhere has you in their sights. And the sooner you know about it the better you can prepare,” said Denis Gorchakov, security expert, Kaspersky Lab.

 

- Ad -

Popular Articles