Speed Is Key in Tackling Data Breach Fallout

Total Page:16

File Type:pdf, Size:1020Kb

Speed Is Key in Tackling Data Breach Fallout INDEPENDENT PUBLICATION BY RACONTEUR.NET #0570 24/02/2019 Distributed in CYBERSECURITY Published in association with ARTIFICIAL CYBER-RESILIENCE FINANCIAL Contributors 02 INTELLIGENCE 06 BY DESIGN 09 IMPACT How should IT experts respond Building a cyber-secure Five ways cyberattacks Davey Winder when AI falls into the wrong hands? business from the ground up can destroy company value Award-winning journalist and author, he specialises in cybersecurity, contributing to Infosecurity magazine. Kate O’Flaherty INCIDENT RESPONSE Freelance tech writer specialising in cybersecurity, her work has appeared in The Guardian, The Times, The Economist, Forbes, and Wired UK. Speed is key in tackling Matthew Staff Former editorial director, he is now applying his multi-sector B2B experience across numerous data breach fallout industry titles. Nafeez Ahmed Investigative journalist and editor In the age of social media and public relations crises of Insurge Intelligence, he has contributed to The Guardian, snowballing out of control, the ensuing hours after a Independent, VICE and The Atlantic. data breach can make or break a company’s reputation Nick Easen Award-winning journalist and broadcaster, he writes on science, technology, economics and business, producing content for BBC World News, CNN and Time magazine. Nick Easen Nick Ismail assive cyberattacks appear to go responding to breaches, will become Content editor of Information Age, he M in waves and we’re probably due even more crucial to business success in writes for technology leaders, helping one soon. Marriott, British Air- the future,” says Tim Rawlins, director at them manage business-critical issues ways, Facebook, Dixons Carphone are NCC Group. for today and in the future. just some of the big names that have been smacked hard in the corporate face. Bruis- Oliver Pickup ing data haemorrhages seem to be a reg- Award-winning journalist, he ular occurrence, while the dreaded fall- specialises in technology, business out on social feeds, tabloid headlines and and sport, and contributes to a wide range of publications. 24-hour online media can be legion. “Once more unto the breach, dear friends, once more” is not so much a line One of the first Tim Cooper from Henry V and the Bard himself, but Award-winning freelance fi nancial more a 21st-century hue and cry from the challenges in dealing journalist, he has written for publications including The Spectator, public relations, C-suite and cybersecu- aff ected organisation often has very few ically – as the breach involved virtually Look closer and you may realise that our with a cyberattack is London Evening Standard, Guardian rity teams as they clamour to shore up tat- facts to work with. Maintaining stakeholder everyone who entered their credit card data infrastructure has been built using Weekly and Weekly Telegraph. tered brand images and stymie any fi nan- time. Incidents can confi dence when you have no facts is a chal- details on their website over the period of methods created in the 20th century and cial losses. lenge and especially because these facts can the hack.” we’re now having to re-engineer our data- “One of the first challenges in dealing go viral and global take days, weeks, even months to uncover.” In the summer of 2018, the details of fed world to deal with security in the 21st, with a cyberattack is time. Incidents can in an instant At the same time, we live in an era when around 380,000 airline bookings were including the cloud, mass digitalisation of go viral and global in an instant. Organ- there’s a toxic cocktail of high breach compromised when hackers obtained supply chains, the internet of things, robot- isations will be dealing with short time- fatigue among consumers and low public names, streets and email addresses, as ics and artifi cial intelligence, as well as the frames to manage reputational risk, trust in companies that hold our precious well as credit card numbers, expiry dates merger between physical and cyber-realms, recover data and prepare a co-ordinated data. Arguably, it’s how businesses have and security codes; certainly enough the so-called fourth industrial revolution. response to regulators, third parties and There’s no doubt that a proactive handled attacks globally that has led to information to steal from people’s bank Next-generation intelligence-driven Publishing manager affected customers,” says Dr Paul Robert- response must be delivered alongside an this state of affairs. accounts. In textbook style, British Air- security is needed. “Before a breach, busi- Reuben Howard son, cybersecurity, privacy and resilience honest plan to tackle a breach, even if its “The reporting of incidents has gen- ways immediately contacted customers nesses struggle to know whether they director at EY. knee jerk, otherwise it’s carnage. erally been poor and often doesn’t high- when the breach became clear. need to invest and struggle to under- Associate editor We also have to face up to the fact we “The saying that 'a lie can travel half- light the real scope of a data breach, with “Within the incident report, you had stand what the impact of inaction will be Peter Archer live in a post-GDPR world. Companies way around the world before the truth has incident reports littered with non-defi - to scroll down the page to see the advice on their business. They know this after a Managing editor have 72 hours to fess up to a cyberattack its shoes on' is very real when it comes to nite words such as ‘could have’, ‘might related to credit cards. At the time, the breach, of course, but at which point it’s Benjamin Chiou or face crippling fines under the EU’s Gen- social media. A misrepresentation of the be’ and so on,” says Professor Bill announcement was your passport details too late,” says Nigel Ng, vice president of eral Data Protection Regulation. As the facts can become a ‘fact’ very quickly and Buchanan, cybersecurity expert at Edin- were safe and that your card details were international sales at RSA Security. Head of production clock ticks in those early hours, the pres- is then often picked up by traditional news burgh Napier University. at risk. You can see that PR teams will try Many organisations are now being more Justyna O'Connell sure can be extreme. sources,” warns Richard Horne, cyberse- “In the case of British Airways, to soften the scope of a data breach, but proactive and less reactive. As Cesar Cer- “Consumers are becoming increas- curity partner at PwC. every customer should have stopped this doesn’t help the media or the general rudo, chief technology officer at IOActive, Digital content executive ingly savvy about the value of their “Cyber-crises are also diff erent to many transactions on their credit card – public understand the scope of an attack,” puts it: “This is no longer an IT issue, but a Fran Cassidy data. Transparency, particularly when others in that directly after the event, the in fact, it should have happened automat- says Professor Buchanan. business imperative.” Although prepared- ness is more prevalent in the likes of say Design financial services than in healthcare. Grant Chapman Big companies now have so-called Sara Gelfgren MOST CONCERNING CONSEQUENCES OF A CYBERATTACK TIME TAKEN TO IDENTIFY AND CONTAIN Kellie Jerrard fi re-response policies and cyber- A DATA BREACH, BY ROOT CAUSE Harry Lewis-Irlam Percentage of executives who believe the following would have a big impact on their organisation breach simulations bringing IT, public Samuele Motta Survey of 477 companies that experienced relations and customer service teams together a data breach in 2018 as they work on dry runs and responses. How- Head of design Business interruption ever, there’s increasing realisation that a Tim Whitlock 75% Average number of days to identify more holistic approach is needed. Average number of days to contain “Embedding security into an organi- sation's DNA goes far beyond just raising Reputational damage 59% Although this publication is funded through ad- awareness or training people; everyone vertising and sponsorship, all editorial is without 221 needs to understand how the business bias and sponsored features are clearly labelled. Malicious or For an upcoming schedule, partnership inquir- decisions they make can impact cyber- Breach of customer information 55% criminal attack ies or feedback, please call +44 (0)20 8616 7400 risk,” says Mr Horne. However, this still or e-mail [email protected]. Raconteur is a 81 doesn’t tackle the issue of reviving pub- leading publisher of special-interest content and research. Its publications and articles cov- Data or software damage % lic trust, which is sorely needed before the er a wide range of topics, including business, 49 next round of breaches. fi nance, sustainability, healthcare, lifestyle and technology. Raconteur special reports are pub- “It is often difficult to tell the difference lished exclusively in The Times and The Sunday Extortion/ransomware 177 between say a bank which invests heav- Times as well as online at raconteur.net. The 41% System glitch ily in their cybersecurity and one that information contained in this publication has been obtained from sources the Proprietors doesn’t,” says Professor Buchanan. believe to be correct. However, no legal liability Liability to third parties 60 “For those affected, it is often finan- can be accepted for any errors. No part of this 35% cial loss, which worries many people, and publication may be reproduced without the pri- resulting from a breach or consent of the Publisher. © Raconteur Media therefore we need ever-increasing levels of security. Our ‘Wild West’ of data-han- Disruption/interruption of industrial 29% 174 systems or other technology Human error dling and data-mining needs to end some- time soon.
Recommended publications
  • The Evolution of Ransomware
    The evolution of ransomware SECURITY RESPONSE The evolution of ransomware Kevin Savage, Peter Coogan, Hon Lau Version 1.0 – August 6, 2015 Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today. CONTENTS OVERVIEW ..............................................................................3 Key information ......................................................................5 Types of ransomware .............................................................5 How ransomware has evolved ...............................................7 Targets for ransomware .......................................................13 Systems impacted by ransomware ......................................14 Ransomware: How it works ..................................................18 Ransom techniques ..............................................................27 How widespread is the problem of ransomware .................33 What does the future hold for ransomware? .......................37 Conclusion ............................................................................45 Appendix ..............................................................................47 Mitigation strategies ............................................................51 Symantec detections for common ransomware families 54 Resources .............................................................................56 OVERVIEW Never before in the history of human kind have people across the world been
    [Show full text]
  • Crimeware on the Net
    Crimeware on the Net The “Behind the scenes” of the new web economy Iftach Ian Amit Director, Security Research – Finjan BlackHat Europe, Amsterdam 2008 Who Am I ? (iamit) • Iftach Ian Amit – In Hebrew it makes more sense… • Director Security Research @ Finjan • Various security consulting/integration gigs in the past – R&D – IT • A helping hand when needed… (IAF) 2 BlackHat Europe – Amsterdam 2008 Today’s Agenda • Terminology • Past vs. Present – 10,000 feet view • Business Impact • Key Characteristics – what does it look like? – Anti-Forensics techniques – Propagation methods • What is the motive (what are they looking for)? • Tying it all up – what does it look like when successful (video). • Anything in it for us to learn from? – Looking forward on extrusion testing methodologies 3 BlackHat Europe – Amsterdam 2008 Some Terminology • Crimeware – what we refer to most malware these days is actually crimeware – malware with specific goals for making $$$ for the attackers. • Attackers – not to be confused with malicious code writers, security researchers, hackers, crackers, etc… These guys are the Gordon Gecko‟s of the web security field. The buy low, and capitalize on the investment. • Smart (often mislead) guys write the crimeware and get paid to do so. 4 BlackHat Europe – Amsterdam 2008 How Do Cybercriminals Steal Business Data? Criminals’ activity in the cyberspace Federal Prosecutor: “Cybercrime Is Funding Organized Crime” 5 BlackHat Europe – Amsterdam 2008 The Business Impact Of Crimeware Criminals target sensitive business data
    [Show full text]
  • Comptia® Security+ SY0-601 Cert Guide
    CompTIA® Security+ SY0-601 Cert Guide Omar Santos Ron Taylor Joseph Mlodzianowski A01_Santos_Fm_pi-plii_1.indd 1 01/06/21 2:49 pm CompTIA® Security+ SY0-601 Cert Guide Editor-in-Chief Copyright © 2022 by Pearson Education, Inc. Mark Taub All rights reserved. No part of this book shall be reproduced, stored in Product Line Manager a retrieval system, or transmitted by any means, electronic, mechanical, Brett Bartow photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the Executive Editor information contained herein. Although every precaution has been taken in Nancy Davis the preparation of this book, the publisher and author assume no respon- Development Editor sibility for errors or omissions. Nor is any liability assumed for damages Christopher A. Cleveland resulting from the use of the information contained herein. ISBN-13: 978-0-13-677031-2 Managing Editor ISBN-10: 0-13-677031-2 Sandra Schroeder Library of Congress Control Number: 2021935686 Senior Project Editor ScoutAutomatedPrintCode Tonya Simpson Copy Editor Trademarks Chuck Hutchinson All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Pearson IT Certification Indexer cannot attest to the accuracy of this information. Use of a term in this book Erika Millen should not be regarded as affecting the validity of any trademark or service mark. Proofreader Abigail Manheim Warning and Disclaimer Technical Editor Every effort has been made to make this book as complete and as accurate Chris Crayton as possible, but no warranty or fitness is implied.
    [Show full text]
  • Malware to Crimeware
    I have surveyed over a decade of advances in delivery of malware. Over this daVid dittRich period, attackers have shifted to using complex, multi-phase attacks based on malware to crimeware: subtle social engineering tactics, advanced how far have they cryptographic techniques to defeat takeover gone, and how do and analysis, and highly targeted attacks we catch up? that are intended to fly below the radar of current technical defenses. I will show how Dave Dittrich is an affiliate information malicious technology combined with social security researcher in the University of manipulation is used against us and con- Washington’s Applied Physics Laboratory. He focuses on advanced malware threats and clude that this understanding might even the ethical and legal framework for respond- ing to computer network attacks. help us design our own combination of [email protected] technical and social mechanisms to better protect us. And ye shall know the truth, and the truth shall make you free. The late 1990s saw the advent of distributed and John 8:32 coordinated computer network attack tools, which were primarily used for the electronic equivalent of fist fighting in the streets. It only took a few years for criminal activity—extortion, click fraud, denial of service for competitive advantage—to appear, followed by mass theft of personal and financial data through quieter, yet still widespread and auto- mated, keystroke logging. Despite what law-abid- ing citizens would desire, crime does pay, and pay well. Today, the financial gain from criminal enter- prise allows investment of large sums of money in developing tools and operational capabilities that are increasingly sophisticated and highly targeted.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Data Thieves: the Motivations of Cyber Threat Actors and Their Use
    Testimony Data Thieves The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data Lillian Ablon CT-490 Testimony presented before the House Financial Services Committee, Subcommittee on Terrorism and Illicit Finance, on March 15, 2018. For more information on this publication, visit www.rand.org/pubs/testimonies/CT490.html Testimonies RAND testimonies record testimony presented or submitted by RAND associates to federal, state, or local legislative committees; government-appointed commissions and panels; and private review and oversight bodies. Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2018 RAND Corporation is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. www.rand.org Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data Testimony of Lillian Ablon1 The RAND Corporation2 Before the Committee on Financial Services Subcommittee on Terrorism and Illicit Finance United States House of Representatives March 15, 2018 ood afternoon, Chairman Pearce, Ranking Member Perlmutter, and distinguished members of the subcommittee. Thank you for the invitation to testify at this important G hearing, “After the Breach: the Monetization and Illicit Use of Stolen Data.” Cybersecurity is a constant and growing challenge.
    [Show full text]
  • Malware Primer Malware Primer
    Malware Primer Malware Primer Table of Contents Introduction Introduction ...........................................................................................................................................................................2 In The Art of War, Sun Tzu wrote, “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” This certainly applies Chapter 1: A Brief History of Malware—Its Evolution and Impact ..............................3 to cyberwarfare. This primer will help you get to know cybercriminals by providing you with a solid foundation in one of their principle weapons: Chapter 2: Malware Types and Classifications ....................................................................................8 malware. Chapter 3: How Malware Works—Malicious Strategies and Tactics ........................11 Our objective here is to provide a baseline of knowledge about the different types of malware, what malware is capable of, and how it’s distributed. Chapter 4: Polymorphic Malware—Real Life Transformers .............................................14 Because effectively protecting your network, users, data, and company from Chapter 5: Keyloggers and Other Password Snatching Malware ...............................16 malware-based attacks requires an understanding of the various ways that the enemy is coming at you. Chapter 6: Account and Identity Theft Malware ...........................................................................19 Keep in mind, however, that we’re only able here
    [Show full text]
  • Malware Risks and Mitigation Report
    MALWARE RISKS AND MITIGATION REPORT June 2011 BITS A DIVISION OF THE FINANCIAL SERVICES ROUNDTABLE 1001 PENNSYLVANIA AVENUE NW SUITE 500 SOUTH WASHINGTON, DC 20004 202-289-4322 WWW.BITS.ORG BITS Malware Risk and Mitigation Report Table of Contents 1. Executive Summary ..............................................................................................................3 2. Malware Evolution................................................................................................................3 2.1 Malware Categories...............................................................................................................................5 2.2 Malware Example .................................................................................................................................8 2.3 Polymorphic Malware ........................................................................................................................10 3. Malware Supply and Demand ............................................................................................ 10 3.1 The Malware Industry ........................................................................................................................11 3.2 Malware Supply Chain........................................................................................................................13 3.3 Beyond Crime......................................................................................................................................14 4. Malware in Financial
    [Show full text]
  • Netflix Announces 70 Star-Packed 2021 Films
    Established 1961 13 Lifestyle Features Thursday, January 14, 2021 Vogue cover photo of a casual give Harris “due respect.” Social media need,” Wintour said. Harris, 56, has not Vice President-elect Kamala Harris users also slammed the photo’s lighting publicly reacted but sources close to her Ahas sparked controversy, with crit- and questioned whether the magazine have told US media that she was sur- ics saying it diminishes the politician’s had lightened Harris’s skin. “Obviously prised by the choice of the more relaxed achievements, forcing editor Anna we have heard and understood the reac- photo. Wintour to defend the image Tuesday. tion to the print cover and I just want to The controversy is the latest to engulf Criticism of the cover has spread on reiterate that it was absolutely not our Wintour, who found herself under pres- social media since it was released on intention to, in any way, diminish the sure during the massive Black Lives Sunday, with users insisting that what importance of the Vice President-elect’s Matter protests that swept the US last they see as a poorly composed portrait of incredible victory,” Wintour said in a summer. She apologized for not making Harris wearing sneakers is disrespectful statement to New York Times reporter enough room for Black stylists and pho- to the first Black woman to be elected Kara Swisher. Swisher, host of the pod- tographers in the magazine. Wintour vice president. The photo-in which Harris cast “Sway,” also broadcast a rare inter- added that she also took “full responsibili- also wears a blazer and jeans-was taken view with Wintour Tuesday that was car- ty” for “publishing images or stories that by American photographer Tyler Mitchell, ried out before the controversy.
    [Show full text]
  • Product Use Cases
    Product Use Cases Founded in 2004, NetSecurity’s vision is “to be the brand of choice in security, forensics, and training.” The company’s mission is to detect and prevent advanced attacks and data breaches in real- time. NetSecurity provides unparalleled innovation, world-class quality, customer-focused, and timely solutions. © NetSecurity® Corporation | 22375 Broderick Drive, Suite 210, Dulles, VA 20166 Phone: (703) 444-9009 | Toll Free: 1-855-NETSECURITY | Web: netsecurity.com | Email: [email protected] NetSecurity®, NetSecurity Logo, ThreatResponder®, ThreatRover™, Who is Hacking Your Network™ and Hands-On How-To® are registered trademarks of NetSecurity Corporation. Product Use Cases Table of Contents Product Overview ......................................................................................................................................... 1 Key Differentiators ....................................................................................................................................... 2 Summary of Use Cases ................................................................................................................................. 3 Use Case > Continuous Threat Detection, Prevention, and Hunting .......................................................... 4 The Challenge/Problem ........................................................................................................................... 4 The Solution .............................................................................................................................................
    [Show full text]
  • Cyber Security in a Volatile World
    Research Volume Five Global Commission on Internet Governance Cyber Security in a Volatile World Research Volume Five Global Commission on Internet Governance Cyber Security in a Volatile World Published by the Centre for International Governance Innovation and the Royal Institute of International Affairs The copyright in respect of each chapter is noted at the beginning of each chapter. The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the Centre for International Governance Innovation or its Board of Directors. This work was carried out with the aid of a grant from the International Development Research Centre (IDRC), Ottawa, Canada. The views expressed herein do not necessarily represent those of IDRC or its Board of Governors. This work is licensed under a Creative Commons Attribution — Non-commercial — No Derivatives License. To view this licence, visit (www.creativecommons.org/licenses/ by-nc-nd/3.0/). For re-use or distribution, please include this copyright notice. Centre for International Governance Innovation, CIGI and the CIGI globe are registered trademarks. 67 Erb Street West 10 St James’s Square Waterloo, Ontario N2L 6C2 London, England SW1Y 4LE Canada United Kingdom tel +1 519 885 2444 fax +1 519 885 5450 tel +44 (0)20 7957 5700 fax +44 (0)20 7957 5710 www.cigionline.org www.chathamhouse.org TABLE OF CONTENTS About the Global Commission on Internet Governance . .iv . Preface . v Carl Bildt Introduction: Security as a Precursor to Internet Freedom and Commerce . .1 . Laura DeNardis Chapter One: Global Cyberspace Is Safer than You Think: Real Trends in Cybercrime .
    [Show full text]
  • THE RANSOMWARE THREAT: a Guide to Detecting an Attack
    www.comtact.co.uk THE RANSOMWARE THREAT: A Guide to Detecting an Attack Attacks are Shifting from Individuals to Organisations Until recently, most ransomware attacks were simply opportunistic and mostly affected individual users’ or small businesses’ computers. This has been, and continues to be, a lucrative business for criminals who consider end users to be low-hanging fruit. But now they have set their sights on larger organisations that have bigger budgets to pay bigger ransom demands. They also have more important files and computer systems that are critical to the organisations’ daily operations. The threat is shifting, according to Ryan Sommers, Manager of Incident Response at LogRhythm. “We are seeing criminals shift their tactics to targeted ransomware attacks. They scope out a specific organization that has deep pockets and is more likely to pay a hefty ransom request in order to minimize the downtime,” says Sommers. Many of the attacks on individuals and small businesses are mass distribution ransomware. The victims are usually targets of opportunity (i.e., these people/businesses were not specifically targeted because of who they were). They most likely acquired the malware through a phishing email, through a drive-by download, or from a compromised website. For example, websites belonging to The New York Times , the BBC, AOL and the NFL have all been hijacked by a malicious campaign that attempts to install ransomware on visitors’ computers. On the surface, mass distribution and targeted attacks appear to be similar, but there are underlying technical differences. Mass distribution attacks are typically automated, very fast in their execution — often just 15 minutes from initial infection to a ransom demand being made — and well orchestrated from the attacker’s perspective.
    [Show full text]