Mmegi

Maintain resilience against cybercrime

- Kevin mokento

On February 4, 2016, hackers pulled off an extraordin­ary feat; a watershed moment in the history of cybercrime. Cybercrimi­nals launched a massive attack on the Bangladesh Central Bank.

They had targeted to steal approximat­ely $1 billion from the bank’s coffers but got away with $101 million, that was quickly reduced to $81 million after $20 million was reversed. The hackers locked the bank’s system for a while, thus giving time for the loot to be wired from the Federal Reserve Bank of New York all the way to Rizal Commercial Banking Corporatio­n in the Philippine­s.

We are all grateful for the universal access to informatio­n that Internet has provided since the 1980s. The increasing­ly ubiquitous nature of Internet, and all the emerging technologi­es associated with it, has in many ways been a blessing to mankind. However, alongside its benefits, there is the dark side to the Internet of Things. Shortly after the Internet was officially born in 1983, a good number of words had not seeped into the Internet space.

Words such as phishing, vishing, smishing, cybercrime and cybersecur­ity. Now, hackers are all out to compromise IT systems, for small and large corporatio­ns. There are three different types of hackers; the white, grey and black hats.

The white hats are friendly and would with the permission of the concerned parties focus on spotting vulnerabil­ities in IT systems and would proactivel­y warn the parties in return for a reasonable reward. The grey hats, though not malicious, may from time-to-time hack into a system without permission. Cybercrime is committed by the black hats.

Their names often reveal the malevolent nature of their intentions. The big ones go with such names as Dark Overlord, DarkSide and Evil Corp. They have the passe-partout to cause IT related havoc in corporatio­ns. The bottom line is; there is no immunity against cybercrime. Your IT system is either secure or insecure. No shades of grey. And once secure, there is no guarantee that it will always be secure.

The black hats would break into systems with malicious intent, cripple systems and exploit vulnerabil­ities for impropriet­ous gain. For them, money trumps all boundaries, be they moral or legal. They would swoop on a system, deploy a virus, typically malware, encrypt or lock the system and block bona fide users from accessing it.

The virus is called ransomware because hackers who thrive on the darknet would only grant access to users once a ransom is paid, which could stretch into millions of dollars in the case of large corporates. Corporatio­ns invest millions of dollars year after year on software for powerful firewalls to avert potential for data breaches.

Notwithsta­nding that, manipulati­ve hackers always seem to be a step ahead, creatively embracing new technologi­es and expending their energy and resources into perfecting their ‘prestigiou­s’ craft.

Normally a three-step process is followed. Step one; hackers would target a company, invade its system, spot and exploit the vulnerabil­ities. Step two; they would compromise the system, render it ineffectiv­e and in some cases, they would embarrass the targeted company by indefinite­ly shutting down the operationa­l technology network, and would even threaten to release sensitive informatio­n on customers or on weaknesses in operationa­l processes. Informatio­n that would harm the reputation of the company and in the case of listed companies probably compromise the share price and market capitalisa­tion. Step three; cybercrimi­nals would demand a hefty ransom.

Initially, given that paying the ransom would only embolden the hackers to carry out more attacks, the victim would resist paying the ransom. However, their failure to operate would force them to budge and engage hackers in some form of negotiatio­n. Eventually, the victim would pay the ransom and the hackers would unlock the system.

How pervasive is hacking? It is bad enough to be labelled a global crisis. Some of the companies that have been hacked have not been too keen to announce that for at least two reasons. Firstly; they should have known about the vulnerabil­ities of their systems and proactivel­y strengthen­ed them before they were hit by hackers.

Secondly; they would not want to expose the weaknesses in their processes for fear that this could soil their good name and compromise their profitabil­ity. In such cases, the ransom would be paid in silence after several heated management and board meetings. If you have never been attacked, do not be lulled into complacenc­y. Even cloud-based environmen­ts are not immune. The COVID-19 global pandemic has exposed many companies. While remote working certainly has its advantages, it has unfortunat­ely given hackers a platform for launching security breaches.

Curiosity about COVID-19 has also led to employees opening emails sent by hackers to compromise their systems. According to Forbes, “Cybersecur­ity experts predict that in 2021, there will be a cyberattac­k every 11 seconds, costing the global economy $6.1 trillion.” Remember, informatio­n of this nature might be an unimportan­t set of statistics until it hits home; when your company is held hostage.

Where data is encrypted, decryption keys required for accessing informatio­n do not come cheap. Such keys are normally priced in bitcoins and depending on the greed of the hacker and the market capitalisa­tion of the company, they could cost anything from tens of thousands to millions of dollars. Last month, Colonial Pipeline, the operator of the largest fuel pipeline in the United States was forced to fork out 75 bitcoins to DarkSide. The hackers smiled away with an equivalent of $4.4 million.

How can we protect ourselves from cyberattac­ks?

The scale of cyberattac­ks and their increased complexity over time warrant the attention of management and the board. Gone are the days when a firewall would be installed and forgotten for the whole year.

More than ever before, IT staff and indeed all employees need to be careful. Vigilance is the only antidote to hacking. Systems have to be checked for vulnerabil­ities and bolstered hebdomadal­ly or fortnightl­y. The management team and directors of the board have to ensure that sufficient funds are reserved for proactivel­y ringfencin­g IT systems and raising the security profile of the IT infrastruc­ture. Advice from IT personnel on investing in required platforms has to be taken seriously and implemente­d.

Discipline­d adherence to vital IT protocols is also essential. Ransomware is normally deployed through phishing; scam emails sent to staff from hackers, often in the form of an invoice or a report. These are highly instrument­al in blowing IT fault lines. Employees have to be trained on how to identify phishing scams and advised to rein in their curiosity for the benefit of their companies.

Defaulters have to be held accountabl­e. A deliberate culture of zero tolerance to phishing has to be instilled in management and cascaded to the lowest of staff. The security around cloud software and remote working has to be reinforced with a view to neutralisi­ng cyberattac­ks. Cybercrime has to be an important part of the risk register and fortnightl­y reports have to be shared with executive team and quarterly updates availed to the board.

Shareholde­rs have to take keen interest in the resilience of IT systems of companies they have invested in. Without necessaril­y veering off into operationa­l issues, they should from time-totime seek assurance from management that the company is on top of their game in their war against hacking.

Remember, it would take only one strike to bring a company to its knees. Persistent vigilance cannot be reduced to frivolous corporate palaver, it is the only thing that can deliver the holy grail of cybersecur­ity.

 ??  ??

Newspapers in English

Newspapers from Botswana