CDM-CYBER-DEFENSE-eMAGAZINE-March-2019
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Data Breaches: Beyond Exposing Identities<br />
Exploring the implications of adversaries or competitors using compromised networks to gain a<br />
business advantage under the guise of a data breach<br />
By Kem Gay, Intelligence Analyst, 4iQ<br />
Exposed data breaches are costly and taxing for companies and customers alike. More<br />
importantly, breaches are likely to lead to economic espionage as exposed networks may reveal<br />
a company’s trade secrets, pending mergers and acquisitions, and other proprietary information<br />
(PI), threatening a business’s overall competitive advantage. This trend isn’t unique, and it has<br />
become an increasingly common occurrence.<br />
"Studies have calculated that the U.S. loses about 200,000 jobs a year, and Europe loses<br />
as many as 150,000 due to cyber theft, including digital theft, piracy, and espionage."<br />
Graff<br />
- The Dawn of the Code War, John P. Carlin with Garrett M.<br />
In the past two years, the U.S. Department of Justice has indicted several individuals for<br />
cybercrimes related to espionage and stolen personally identifiable information (PII). In December<br />
2018, two Chinese nationals were indicted for conspiracy to commit computer intrusions,<br />
conspiracy to commit wire fraud, and aggravated identity theft. The pair, members of a known<br />
advanced persistent threat (APT) group colluding with China’s intelligence services, stole<br />
sensitive technology-related business information from companies and government agencies<br />
across 12 different countries. In addition, more than 40 computers were compromised in order to<br />
steal PII belonging to over 100,000 U.S. Navy personnel.<br />
In late 2017, three Chinese hackers were also indicted for similar offenses. In <strong>March</strong> of the same<br />
year, cyber criminals colluding with two Russian intelligence agents were indicted for<br />
unauthorized access to a U.S. email service provider resulting in computer hacking, economic<br />
espionage, and conspiracy. The perpetrators stole at least 500 million email accounts and trade<br />
secrets related to the company. Although we cannot determine, ‘Which came first: the chicken or