Beware the Invisible Bad Guys: Cyberespionage and Your Business
Total Page:16
File Type:pdf, Size:1020Kb
SPECIAL REPORT BEWARE THE INVISIBLE BAD GUYS: CYBERESPIONAGE AND YOUR BUSINESS With Kaspersky, now you can. kaspersky.com/business Be Ready for What’s Next CONTENTS “Many cyberattacks can be mitigated by relatively Cyberespionage: simple measures. Why should your business care? 4 Espionage is nothing new 5 Unfortunately, some What do the perpetrators gain? 7 people fail to take Is any business safe? 8 what appear to be basic precautions – such as Methods of spreading cyberespionage malware 14 using strong passwords, Beyond cyberespionage 16 applying patches, and How can you protect running a security your business? 17 solution. In many cases, How Kaspersky Lab security breaking into a company’s technologies can help 22 network is easier than Appendix: it sounds.” An overview of some COSTIN RAIU significant cyberthreats 28 “High-profile targeted DIRECTOR, GLOBAL RESEARCH & ANALYSIS TEAM A cyberglossary 30 KASPERSKY LAB attacks on enterprises About Kaspersky 34 are becoming increasingly widespread. Thousands of businesses have already been hacked and had their sensitive data stolen – resulting in multi-billion dollar losses. Cyberespionage is a tangible and growing global threat today – and fighting it is one of the principal tasks we’ve set ourselves.” EUGENE KASPERSKY CEO, KASPERSKY LAB 2 3 WHY SHOULD YOUR BUSINESS ESPIONAGE IS NOTHING NEW CARE ABOUT CYBERESPIONAGE? EXECUTIVE OVERVIEW Espionage, in one form or another, has existed for as long as any Cyberespionage may sound like some strangely exotic activity from organization or individual has felt that it could gain an advantage the movies. However, the harsh reality is that almost any business by illicitly accessing someone else’s confidential information. Everyone’s can become a target – or can be damaged in the crossfire when familiar with various nation states’ attempts to steal other countries’ cybercriminals launch an attack against another organization. secrets. Similarly, industrial espionage has also been a feature of business life for a long time. However, recent years have seen a dramatic change in It’s largely immaterial whether your business is being directly targeted the level and nature of the espionage threats that can affect businesses or just happens to suffer collateral damage as a result of getting of all sizes. caught up in another organization’s ‘battle’. Either way, the results can be devastating. The ease with which cyberespionage campaigns can be implemented is now In this report, Kaspersky Lab’s cybersecurity experts give you an enticing more organizations into running their own spying activities – even insight into: though many of these organizations would never have considered undertaking old-fashioned industrial espionage. • How businesses can suffer from direct – and indirect – cyberespionage attacks • What you can do to protect your business… and its hard-won reputation • How specific technologies can help defend your corporate network and data against sophisticated threats The risks are real – and they’re growing in volume and sophistication – but Kaspersky is here with sound advice… and innovative protection technologies. 4 5 WHAT DO THE PERPETRATORS SO WHAT’S CHANGED? SIMPLIFIED SPYING… WITH MORE As the Internet-enabled age gathered IMMEDIATE REWARDS GAIN FROM CYBERESPIONAGE? pace and greater connectivity and Gone are the days of having to break improved mobile communications into office premises or patiently became possible, businesses were wait for ‘insider contacts’ to gather quick to recognize the benefits of information and pass on secrets. giving their employees, customers, Rummaging through a company’s and suppliers ‘anywhere, anytime wastepaper bins or paying office staff access’ to business systems and to collect data was always inefficient, DIFFERENT TYPES OF ATTACKERS “Information is power – so, when essential data. The efficiency and time-consuming, and risky. Now, it’s HAVE DIFFERENT OBJECTIVES: a cybercriminal steals information, productivity benefits have been simply unnecessary. With the right • Cybercriminals readily the theft can neutralize any considerable – even ‘game changing’ computer hacking skills, individuals understand the value of advantage enjoyed by the original for many businesses, as the Internet and organizations can spy on corporate information. There owner of the data. has helped them to open up new companies and obtain valuable are opportunities to gain from This applies whether the target sales channels and generate information – without ever having extortion and ransom campaigns – is a nation state – holding military additional revenues. to leave the comfort of their office. as well as selling stolen data secrets – or a business with on the black market. intellectual property and However, that same ‘always-on Businesses can be attacked via • Hacktivists focus on causing commercial secrets that give connectivity’ – to business insecurities in their own website, reputation damage and disruption them a competitive advantage.” information and other sensitive data through vulnerabilities in popular to organizations that the – has also created opportunities business software that they’re hacktivists have issues with. They SERGEY LOZHKIN for cybercriminals. With businesses running or as a result of their realize that a leak of confidential SECURITY RESEARCHER GLOBAL RESEARCH & ANALYSIS TEAM storing intellectual property and employees clicking on malware- information – about customers, KASPERSKY LAB confidential information within infected emails. suppliers or employees – could networked systems, spying lead to severe embarrassment operations are much easier to and/or significant legal penalties. implement and can be much more • Cybermercenaries seek payment “Businesses of all sizes process rewarding for the perpetrators. from anyone who will hire them – and store data that’s of value including governments, protest to themselves, their customers, groups, or businesses – to steal and/or their competitors. CYBERATTACKS HAVE A SEVERE specific information. WHEN BUSINESSES LOSE DATA… Even a simple database of IMPACT ON A BUSINESS’S • Nation states (government … THEY OFTEN LOSE MUCH MORE customer contact information ‘BOTTOM LINE’ agencies) – or their contractors – is valuable.” AVERAGE LOSSES IN THE EVENT OF A AVERAGE COST OF A DATA LOSS INCIDENT focus on collecting strategic TARGETED CYBERATTACK: FOR A LARGE ENTERPRISE: information or disrupting industrial PETER BEARDMORE facilities in hostile countries. SENIOR DIRECTOR OF PRODUCT MARKETING KASPERSKY LAB $2.4MSource: Global Corporate IT Security Risks 2013, B2B International Source:$649,000 Global Corporate IT Security Risks 2013, B2B International 6 7 IS ANY BUSINESS SAFE FROM CYBERESPIONAGE? IS YOUR BUSINESS A PRIME GOOGLE, ADOBE AND OTHERS ATTACKED TARGET? Described as a watershed moment in It is easy to understand why cybersecurity, the Operation Aurora attack hit government organizations and Google, Adobe, and over 30 other high profile military agencies are subjected companies in 2009. to cyberespionage attacks. Apart Despite efforts to address the software from state-sponsored initiatives, vulnerabilities that were exploited by the independent protest groups often attackers, in 2012 it was revealed that the The simple answer is no. Even the smallest businesses can be directly attempt to disrupt government exploit continued to target defense contractors and the supply chains of third-party companies. targeted for the sensitive or valuable information they hold – from operations or steal sensitive customer banking details, to supplier information or even data that can information. Cybermercenaries The attackers seek to gain control over be used to help stage an attack on a larger enterprise. also target government bodies – corporate systems and steal sensitive data. to fulfill their employers’ objectives Insecure websites and email phishing strategies are at the heart of what is widely For example, ‘supply chain attacks’ – such as IceFog (see Appendix I) – for stealing money or data. believed to be a state-sponsored collect information from various third-party bodies/suppliers and then cyberespionage attack. use that data to develop and enable targeted attacks against specific Similarly, because they hold a businesses or organizations. wealth of valuable information – and have hard-won business ATTACKS AGAINST AMERICAN EXPRESS AND reputations that they need to JP MORGAN CHASE protect – large enterprises and “When you’re assessing the risks to your business, never multinational corporations are In 2013, both American Express and underestimate how the ‘human element’ can weaken your also obvious targets for a vast JP Morgan Chase became the victims of cyberattacks that were claimed to have been defenses. If employees fall for spearphishing campaigns or click array of different types launched by a religious group. However, US on an ‘infected’ link in an email, your security could be of cyberattack, including intelligence and security experts believe that cyberespionage. Iran was responsible for the attacks. at risk.” The attacks took both companies offline for SERGEY LOZHKIN several hours. SECURITY RESEARCHER GLOBAL RESEARCH & ANALYSIS TEAM Over a six-week period at the beginning of KASPERSKY LAB 2013, 15 of the US’s largest banks suffered a total of 249 hours offline as a result of cyberattacks. “It doesn’t matter if you’re talking about a Fortune 500 Company, or a two-person start-up operating in someone’s parents garage. Everyone has something to lose.”