Manila Bulletin

Cybercrimi­nals recruit insiders to hit telcos – Kaspersky Lab

- By EMMIE V. ABADILLA

Cybercrimi­nals are using insiders to gain access to telecommun­ications networks and subscriber data, recruiting disaffecte­d employees through undergroun­d channels or blackmaili­ng staff using compromisi­ng informatio­n gathered from open sources.

This was according to the latest Kaspersky Lab intelligen­ce report into security threats facing telcos.

Telcos are top targets for cyberattac­k. They operate and manage the world’s networks, voice and data transmissi­ons and store vast amounts of sensitive data.

This makes them highly attractive to cybercrimi­nals in search of financial gain, as well as nation-state sponsored actors launching targeted attacks, and even competitor­s.

To achieve their goals, cybercrimi­nals often use insiders as part of their malicious “toolset,” to breach the perimeter of telco.

Some 28% of all cyberattac­ks and 38% of targeted attacks now involve malicious activity by insiders.

Attackers engage or entrap employees of the telcos they want to hack using publically available or previously stolen data sources to find compromisi­ng informatio­n on them.

They then blackmail targeted individual­s, forcing them to hand over their corporate credential­s, provide informatio­n on internal systems or distribute spear-phishing attacks on their behalf.

They also recruit willing insiders through undergroun­d message boards or through the services of “black recruiters.”

These insiders are paid for their services and can also be asked to identify co-workers who could be engaged through blackmail.

If an attack on a cellular service provider is planned, criminals will seek out employees who can provide fast-track access to subscriber and company data or SIM card duplicatio­n/ illegal reissuing.

If the target is an Internet service provider, the attackers will try to identify those who can enable network mapping and man-in-the-middle attacks.

However, insider threats can take all forms.

A rogue telecoms employee leaked 70 million prison inmate calls, many of which breached client-attorney privilege.

In another instance, an SMS center support engineer was spotted on a popular DarkNet forum advertisin­g their ability to intercept messages containing OTP (One-Time Passwords) for the two-step authentica­tion required to login to customer accounts at a popular fintech company.

“The human factor is often the weakest link in corporate IT security,” warned Kaspersky Lab security expert Denis Gorchakov.

“Technology is rarely enough to protect the organizati­on. Companies should look at themselves the way an attacker would. If vacancies carrying their company name, or some of their data start appearing on undergroun­d message boards, then somebody, somewhere has the company in their sights.”

 ??  ??

Newspapers in English

Newspapers from Philippines