Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Networking

    Info Thieves Take Aim at the Enterprise

    Written by

    Matt Hines
    Published January 11, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Among the long list of bills reintroduced with the opening of the U.S. Congress on Jan. 5 were two filed by Sen. Dianne Feinstein, D-Calif., aimed at forcing companies to better protect consumer information and publicly report any potential mishandlings.

      However, according to a range of IT security researchers, businesses should be just as afraid of having their own valuable data stolen by hackers as they should be scared of losing customer records, because it appears malware writers are aggressively ramping up their efforts to create attacks meant to target corporate information.

      While few virus examples have been publicly identified that exhibit this growing focus on stealing valuable business data, versus the many that have been unearthed that target consumers personally identifiable information, analysts say there is plenty of evidence that the trend is picking up momentum.

      “Theres no doubt that this type of activity is becoming more popular; weve seen a lot more samples and kits, and real code, that is clearly designed to do things like grab files from local systems, to look for specific types of files used in business operations, and the valuable information in those files,” said Dan Hubbard, vice president of security research at malware filtering specialists Websense, San Diego.

      Hubbard said that in addition to viruses designed to find business documents such as spreadsheets and manufacturing templates, Websense has also seen attacks aimed at companies in specific vertical markets, most notably the aerospace industry. Unlike many of the attacks designed to dupe consumers into handing over their personal details, a high proportion of the enterprise info theft programs display a level of complexity that belies deep professionalism on the part of those writing the threats.

      “A lot of the code were seeing is very sophisticated; some use encryption to hide the stolen data as it is being sent out of the corporate network, others clearly target specific types of workers who have access to valuable data, such as product designers, and others are using unknown zero-day flaws in popular software programs to find a way in the door,” said Hubbard.

      Researchers at anti-virus specialist McAfee, in Santa Clara, Calif., said they recently observed a zero-day attack aimed at three specific users within one company. The level of granularity displayed in such an attack is something that may become the norm in the near future, said Dave Marcus, security research and communications manager for McAfee Avert Labs.

      /zimages/4/28571.gifRead more here about “rogue anti-spyware” and the emergence of hackers looking to hold stolen corporate data up for ransom.

      “There have been attacks aimed at businesses as long as there has been malware, but this was a precision surgical strike that was very professional and well-orchestrated,” said Marcus. “Its hard to say if these types of attacks are growing in volume, but they are certainly growing in terms of sophistication.

      Other security researchers said they have seen similar patterns emerging. While there is no indication that hackers are shifting their focus away from programs that target consumers, as the volume of those threats continues to grow, attacks that attempt to steal corporate passwords, such as the Infostealer.Ldpinch virus, first discovered in late 2003, are becoming a regular occurrence, versus being a flash in the pan, said Ron OBrien, senior security analyst with anti-virus vendor Sophos, in Burlington, Mass.

      In addition to password theft attempts, researchers are predicting that hackers are aiming their sites at enterprises VOIP (voice over IP) systems to listen in on private conversations, and creating attacks that look for sensitive information passing through instant messaging applications, and even corporate data stored on more powerful mobile devices such as smart phones.

      “Were still seeing these in fairly low volumes, but value of hacking your way into a corporate PC will ultimately be much higher to malware writers, as they can almost assuredly remove sensitive information that is worth something to the business, or an outsider,” said OBrien. “I believe well see a lot more of these attacks that try to get onto corporate networks and phone home valuable business data.”

      In addition to stealing information, there are several different types of ransomware attacks that are emerging against businesses that seek to access and obscure information that is of value. The programs, which most often operate as virtual extortion schemes, sometimes encrypt sensitive information and threaten to keep it locked down until the hacker involved gets a payoff.

      Ransomware artists have also begun playing on fears of non-compliance with consumer information handling laws, threatening to expose companies to the types of laws proposed by Feinstein and other members of Congress by forcing them to report breaches to customers, and in the press.

      “Extortion is age-old stuff, but its becoming more dangerous in the sense that the ransomware is becoming far more complex,” said Shane Coursen, senior tech consultant with Kaspersky, in Woburn, Mass. “In addition to being capable of finding more valuable data to corrupt, were seeing more sophisticated encryption that hides the data, and attempts to collect the ransom payments that try to keep the attackers better protected from law enforcement.”

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Ryan Naraines eWEEK Security Watch blog.

      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.