Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

European Central Bank attacked with data for sale – industry views

by The Gurus
July 24, 2014
in Opinions & Analysis
Share on FacebookShare on Twitter

News broke today that the European Central Bank (ECB) had been hacked, and sensitive information had been stolen and was available for “purchase”.
 
A source told IT Security Guru that some personal data was unencrypted and stored in plain text, while other news sources claimed that the attacker was prepared to sell the data for the right fee. The affected database held about 20,000 email addresses and a smaller number of postal addresses and phone numbers, which the ECB said was kept physically separate from internal systems. Here is what the industry had to say about this story.
 

Charles Sweeney, CEO, Bloxx
 
Whilst personal information from an event database might not, for obvious reasons, be deemed to be as important as sensitive market data, theft of this personal information is still a concern. A professional hacker doesn’t need much more than a name, address and date of birth in order to defraud a person and assume their identity.
 
This data might not rank as highly in terms of sensitivity to the wider market place and the ECB itself, but to the individuals that could be potentially be impacted, it is most definitely of concern and underlines the need for all, not just some, data to be robustly protected.
 

Tim Erlin, director of security and risk at Tripwire
 
It’s been a tough week for European banks with regard to cyber security. Unless we’re missing some important facts, it makes little sense for the ECB to pay a hacker money in this circumstance, as there’s no guarantee that he won’t also sell access to the data in addition to getting the ransom. Data isn’t the same as a physical object or person.
 
It’s copied, not stolen. The more typical data ransom scenario involves preventing access to a user’s data via encryption, then selling them the keys to decrypt it. There’s no indication here that the ECB has lost access to this data.
 

Will Semple, VP of research and intelligence for Alert Logic
 
The ECB breach is the latest in a long line of high profile attacks against financial targets. The motivation for this attack seems to be financial gain via ransom; the target was an innocuous website used for managing event information. Not all data was encrypted such as email, telephone and address, while the ECB statement tries to reassure the public that this database was separate from market system
s (which is standard good practice).

 
The result of a breach is disproportional bad press and brand damage, and this is the outcome of the attack. It will be interesting to monitor the markets to see if this incident introduces confidence concerns in the ECB over the next few days.
 

Toyin Adelakun, VP of products for Sestus
 
Most large and high-profile organisations do take security precautions, but the issue of unknown unknowns bedevils every organisation, large and small. For that reason, in the security context, it is always beneficial to have frequent, regular and irregular penetration testing performed to make sure that as many as possible of your blind spots are uncovered.
 
Even better, have multiple or different pen testers address your websites and networks, so that you have a comprehensive view of the threats — and thus a comprehensive view of the necessary security counter-measures.
 
There will always be an arms-race aspect to the management of an organisation’s information security, as attackers are forever probing for vulnerabilities, known and unknown, zero-day and otherwise. Therefore, in addition to putting into place your well-considered defences, it makes sense, as part of a comprehensive security programme, to test those defences.
 

Jon French, security analyst at AppRiver
 
I assume they did the necessary and contacted police right away. After that I assume they deduced how and where the attackers got the data from and fixed the hole in their security. As for the ransom, hopefully no company gives in to these ransoms since that can only fuel future hacks to happen. Hackers will see the method works and it’s profitable.
 
It sounds like the impact is just personal information and not banking information fortunately. However, the individuals effected could be at a higher risk for things like fraud and phishing attacks. Having your personal information could make it easier for a spear phishing attack against you since an attacker showing they have some of your personal information already could be more convincing than just a random email. Likewise the attacker could just attempt to use the gained personal data and attempt to use it to commit fraud.
 

Keith Bird, MD for security specialist Check Point
 
This attack highlights how even high profile organisations with robust defences can fall victim to enterprising cyber criminals. The European Central Bank was clearly unaware it had been infiltrated as it first came aware when the attackers issued a ransom for the data they had obtained.
 

Jason Hart, VP Cloud Security at SafeNet
 
We’re seeing more and more cases of cyber criminals stealing unencrypted data and either selling it on the black market, or using it for cyber blackmail. Any data stored in a plain text state is easily readable and can be easily accessed by cyber criminals. So companies need to think about encrypting all customer data, both in storage and transit.
 
Only those companies that adopt a ‘secure breach’ approach, consisting of a combination of strong authentication, data encryption and key management, can be confident that data is useless should it fall into unauthorised hands.
 
The severity of the breach is minimised because password and financial data was encrypted. But the fact that the hackers were able to get their hands on email address and phone numbers is likely to have a significant impact on customer trust.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Sophisticated "Emmental" campaign targets banking authentication

Next Post

AusCERT head to step down

Recent News

large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023
Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information