<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybercrime Archives - Christian Espinosa</title>
	<atom:link href="https://christianespinosa.com/blog/tag/cybercrime/feed/" rel="self" type="application/rss+xml" />
	<link>https://christianespinosa.com/blog/tag/cybercrime/</link>
	<description>Bestselling Author &#124; Keynote Speaker &#124; Cybersecurity Expert</description>
	<lastBuildDate>Thu, 13 Apr 2023 00:59:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://christianespinosa.com/wp-content/uploads/2021/09/cropped-Christian-Espinosa-Blue-White-Logo-32x32.png</url>
	<title>cybercrime Archives - Christian Espinosa</title>
	<link>https://christianespinosa.com/blog/tag/cybercrime/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too</title>
		<link>https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/</link>
					<comments>https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Thu, 09 Feb 2023 04:17:19 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[people skills]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2802</guid>

					<description><![CDATA[<p>Cybercriminals are persistent and determined. These are great qualities to have in a technical field, but for your organization, it means risk and threats are never static. They are always changing, evolving their techniques to exploit weaknesses and vulnerabilities. As a result, your cyber team must as well. You can’t use the same methods against [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/">Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too' data-link='https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/' data-app-id-name='category_above_content'></div><p><img fetchpriority="high" decoding="async" class="size-medium wp-image-2803 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-300x169.jpg" alt="cybercriminals" width="300" height="169" srcset="https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-300x169.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-1024x576.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-768x432.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-1536x864.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-2048x1152.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-640x360.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Cybercriminals are persistent and determined. These are great qualities to have in a technical field, but for your organization, it means risk and threats are never static. They are always changing, evolving their techniques to exploit weaknesses and vulnerabilities. As a result, your cyber team must as well. You can’t use the same methods against new challenges.</p>
<p>While some of this upskilling is technical, much of it involves <a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">soft skills</a> and developing the attributes that enable flexibility, proactiveness, and perseverance. In this post, we’ll review trends related to cybercriminals and their approaches and discuss ways to arm your technical folks with the right skills to win the cyber war.</p>
<h2>Cybercriminal Trends</h2>
<p>Cybercriminals diversify their attacks and find new avenues to pursue all the time. The trends in cybersecurity relating to their approaches offer some insights for cybersecurity professionals.</p>
<h3>Vulnerable Entry Points Are Attractive Targets</h3>
<p>The proliferation of IoT (Internet of Things) devices has been a monumental implementation for many industries. They collect data for various applications that deliver intelligence to organizations, including health care, manufacturing, and retail.</p>
<p>For all the benefits they bring, they are also the most vulnerable endpoints. Cybercriminals are becoming IoT experts and have infiltrated these devices and been able to transfer between them. It’s familiar ground for hackers to find out how to endanger security through something that helps businesses operate based on data-driven decisions.</p>
<h3>The QR Code Comeback</h3>
<p>Cybercriminals look for ways to use technology trends to plan attacks. QR codes have been around for some time and had a resurgence during the pandemic, including scanning them for menus. Advertisers use them in CTV (connected TV) and broadcast TV ads, prompting users to scan them while watching. A <a href="https://www.theverge.com/2022/2/13/22932397/coinbases-qr-code-super-bowl-ad-app-crash" target="_blank" rel="noopener">Super Bowl commercial in 2022 for Coinbase</a> featured a QR code (and not much else). It was so popular that the site crashed.</p>
<p>Hackers follow consumer preferences and create malicious QR codes that direct people to fake sites.</p>
<h3>Ransomware Keeps Adapting</h3>
<p>Cybercriminals invested lots of time and energy into ransomware attacks in 2022. According to data, ransomware increased <a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noopener">by 13%</a> in 2022. Cybersecurity has great concerns over ransomware, as many organizations experience it regularly, some with dire consequences, such as disrupting healthcare delivery.</p>
<p>The attraction to this method is the money. Many businesses have paid the ransom to retrieve access to data. Even those with backups and mature cybersecurity defenses can be a victim. The adaptation of ransomware occurs as hackers attempt to breach networks.</p>
<h3>Hackers Expose Multifactor Authentication Shortcomings</h3>
<p>Multifactor authentication (MFA) has been a tenet of cybersecurity and access control. The premise is to require more than a password, but hackers have found ways around this. One example is an attack created by Lapsus$ and Yanluowang threat actors. It bypasses the MFA framework through spamming original account holders, referred to as MFA bombing, MFA spamming, or MFA fatigue. It’s worked successfully in incidents involving Microsoft and T-Mobile.</p>
<h3>Phishing and Social Engineering Are So Sophisticated</h3>
<p>The earliest days of phishing were almost comical in delivery. The misspellings and awkward phrases were easy to spot. That was long ago, and hackers are more advanced and sophisticated in social engineering efforts.</p>
<p>It hinges on manipulation and the receiver believing the hacker is truly someone else. More of this is happening at the business level, with employees receiving communications from leadership asking for help. This email spoofing to impersonate others has become very effective. Hackers also use multiple channels, including email, SMS, SIM jacking, and piggybacking.</p>
<p>There has also been an increase in the use of <a href="https://www.techrepublic.com/article/hackers-exploit-google-docs-in-new-phishing-campaign/" target="_blank" rel="noopener">Google properties for phishing</a>. Millions of people use Google Drive and Google Ads for business. Hackers are attempting to “share” documents, “tagging” in the comments of documents, or inviting you to access a Google Ad account. For many, it would seem a logical email to receive and click, and that’s what hackers are counting on them doing.</p>
<h3>Cybercriminals Focus More on Smaller Fish</h3>
<p>Most of the headlines about cyberattacks involve well-known companies. It’s more newsworthy since these can cause outages and downtime and impact millions. However, most hackers don’t put a target on these whales. Smaller fish are easier to penetrate, and many have valuable data. Small- and medium-sized businesses (SMBs) often have less robust cybersecurity protocols and may be dealing with being understaffed as well.</p>
<p>It’s an ideal scenario for hackers eager to infiltrate a network and take control. The result can be a data breach with the aim of selling these assets on the dark web or ransomware. SMBs are highly aware that they are a target but lack the resources to combat them in many cases.</p>
<h3>Cybercrime as a Service Lowers the Barrier to Entry</h3>
<p>A new phenomenon, cybercrime as a service, is another troubling hacking trend. Hackers are for hire, so bad actors no longer need technical aptitude. Rather, they can find a cybercriminal on the dark web to do their bidding. These groups operate like legit businesses in many ways, with developers and engineers.</p>
<p>Seeing the commoditization of cybercrime is a concern for tech teams. It’s increasing the number of attacks, and their sophistication is improving daily.</p>
<p>As you can see, hackers never rest on their laurels. They evolve their methods consistently to reach their goals. It’s the same approach the good guys should also take. Here’s how to keep pace with cybercriminals.</p>
<h2>Keeping Pace with Cybercriminals; Cyber Professionals Must Adapt Too</h2>
<p>Developing your team’s capabilities and expanding them should be a priority for you as a leader. Such a strategy involves both technical and people skills. Focusing on continuous improvement is a requirement to outperform today’s hackers. Here are some critical steps you can take.</p>
<h3>Being Proactive versus Reactive</h3>
<p>A lot of cybersecurity is reactive. It’s how you’ll respond to a threat or attack. All that’s necessary. You have to have a cyber resilience and contingency plan in place. It can often overshadow being proactive, which is something organizations find difficult.</p>
<p>The barrier to being proactive is not so much technical failures. Much of the time, it’s the people and the way they communicate, collaborate, and operate. Cyber professionals tend to think in black and white and crave certainty. There’s much fear around what they perceive as new territory, so they stay set in their ways. As a result, you incur more risk because there’s limited exchange of information or ideas.</p>
<p>To be more proactive, you’ve got to break down those silos and create an environment where communication and collaboration are a priority. You must be an example and find ways to hone these people skills through exercises and other activities. If everyone’s not on the same page, you’ll be stuck in reactive mode, which gives hackers an edge.</p>
<h3>Creating a Cybersecurity Culture</h3>
<p>A <a href="https://christianespinosa.com/blog/the-cyber-threat-no-one-talks-about-the-absence-of-a-cybersecurity-culture/" target="_blank" rel="noopener">cybersecurity culture</a>, in this respect, alludes to the principles and values of your technical team. Building a team that can swiftly adapt requires healthy people skills, including <a href="https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/" target="_blank" rel="noopener">communication</a>, awareness of self and others, trust, a growth mindset, and empathy. It may seem daunting to pursue this, but it’s critical in the cyber war.</p>
<p>When these things are absent, your company increases risk. The environment may be toxic, with bullying, posturing, and disengagement. Any hacker would love to attack such an organization, so it’s critical not to be one of these!</p>
<p>Constructing and maintaining this culture requires several key elements:</p>
<ul>
<li>Employees need to know that their contributions matter and how they align with the company’s goals and wins.</li>
<li>Encouraging the growth of each individual and acknowledging their improvements.</li>
<li>Continuous development of strong communication skills, including what people say, how they say it, and how they listen.</li>
<li>Removing self-centered thinking patterns and embracing <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/?roistat_visit=172849" target="_blank" rel="noopener">cognitive empathy</a>.</li>
</ul>
<h3>Emphasizing Innovation</h3>
<p>Cyber professionals understand innovation, often more from a technical lens. That’s crucial, but a culture of innovation is where new ideas thrive. If you open up your team to operate this way, many great things can happen regarding security. One way to make it front and center is to define what innovation means to your team and discuss ways to sustain it over time.</p>
<p>There is often a misnomer about security being the downfall of innovation. That’s not true, and the two can work in tandem, such as in the framework of <a href="https://christianespinosa.com/blog/why-organizations-should-pivot-to-devsecops/" target="_blank" rel="noopener">DevSecOps</a>. There should be a constant link between security and innovation. It’s a continuous cycle of improvement that enables better results, which are easy to understand for technical folks.</p>
<h2>Cybercriminals vs. Cyber Professionals: Winning the War</h2>
<p>On the battlefield, cybercriminals and cyber professionals are at war. Cybercriminals have had many advantages, much of which are due to their constant evolution and adaptability. Keeping up with hackers involves cyber professionals doing the same thing.</p>
<p>With these tips, your team can forge ahead. You can find more advice and resources for this in my book, <em>The Smartest Person in the Room</em>, which features the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, a seven-step guide to transforming technical people into better communicators and collaborators. <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">Get your copy today</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too' data-link='https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too' data-link='https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/">Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 10 Organized Cybercrime Syndicates</title>
		<link>https://christianespinosa.com/blog/top-10-organized-cybercrime-syndicates/</link>
					<comments>https://christianespinosa.com/blog/top-10-organized-cybercrime-syndicates/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 12 Sep 2021 07:46:07 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[clop]]></category>
		<category><![CDATA[cobalt]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[darkside]]></category>
		<category><![CDATA[evil corp]]></category>
		<category><![CDATA[fin7]]></category>
		<category><![CDATA[goznym]]></category>
		<category><![CDATA[lazarus]]></category>
		<category><![CDATA[magecart]]></category>
		<category><![CDATA[revil]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2657</guid>

					<description><![CDATA[<p>Cybercrime has become so widespread and lucrative that well-organized groups of cybercriminals collaborate to carry out large-scale online heists. These cybercrime gangs consist of hackers, developers, and other tech outlaws who pool their expertise and resources to perform massive crimes that would otherwise be impossible to carry out. In this article, we&#8217;ll be discussing ten [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/top-10-organized-cybercrime-syndicates/">Top 10 Organized Cybercrime Syndicates</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Top 10 Organized Cybercrime Syndicates' data-link='https://christianespinosa.com/blog/top-10-organized-cybercrime-syndicates/' data-app-id-name='category_above_content'></div><p><img decoding="async" class=" wp-image-2658 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/09/crrime-300x169.jpg" alt="cybercrimev" width="457" height="255" />Cybercrime has become so widespread and lucrative that well-organized groups of cybercriminals collaborate to carry out large-scale online heists. These cybercrime gangs consist of hackers, developers, and other tech outlaws who pool their expertise and resources to perform massive crimes that would otherwise be impossible to carry out.</p>
<p>In this article, we&#8217;ll be discussing ten of the most notorious organized cybercrime syndicates and how they operate.</p>
<h2>Traditional Organized Crime vs. Cybercriminal Hacking Groups</h2>
<p>Traditional organized crime and cybercrime have historically been two separate divisions. However, one overarching message emerges from <a href="https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment-2017">Europol&#8217;s Serious and Organized Crime Threat Assessment 2017</a>: organized crime has gone digital, erasing the distinction between the two.</p>
<p>Hackers infiltrating computer networks for the sake of amusement or glory are no longer the norm in the present era of cybercrime. The digital economy&#8217;s growth and expansion have radically altered the criminal landscape.</p>
<p>Cybercriminals seek to join with criminal bosses who have the vision, power, and connections to carry out complicated, far-reaching schemes and hacks, much like traditional organized crime does. These cybercriminal kingpins are only becoming better at what they&#8217;re doing.</p>
<p>The activities and business models of these global cybercrime syndicates are patterned after legitimate businesses. Security analysts believe they are educating new recruits, using collaborative programs, and even employing service agreements amongst the experts they hire.</p>
<h2>Organized Cybercrime Activities</h2>
<p>Hacking, fraud, creation, and distribution of malware, DDoS assaults, extortion, and intellectual property theft are just a <a href="https://www.unodc.org/e4j/en/cybercrime/module-13/key-issues/cyber-organized-crime-activities.html">few of the cybercrimes</a> that cyber-organized criminals have committed. Cybercrime of this nature results in financial, psychological, social, and sometimes bodily harm, and they&#8217;ve also been used to support other major crimes like terrorism.</p>
<p>Criminal organizations that participate in cybercrime also offer services that aid in the commission of crimes and cybercrime (crime as a service), such as:</p>
<ul>
<li>Stolen data and identity documents (including but not limited to voter registration identifications, health and financial data, and passports)</li>
<li>Malware</li>
<li>Botnet services</li>
<li>Distributed denial of service (DDoS) attacks</li>
<li>Keyloggers</li>
<li>Phishing or spear-phishing tools</li>
<li>Hacking tutorials</li>
<li>Information on flaws and vulnerabilities, as well as directions on how to abuse them</li>
</ul>
<p><a href="https://www.europol.europa.eu/sites/default/files/documents/iocta2018.pdf">According to Europol</a>, ransomware remains a high-value focus for criminal groups, with crypto mining malware entering the fray as a less risky alternative. Card skimming is still a popular way for gangs to make money, and many old scams, including advanced-fee fraud, technical support, and romance scams, continue to victimize a substantial number of people. Europol also reports that computer hackers that previously attacked conventional financial institutions are now eyeing businesses and cryptocurrency users.</p>
<h2>10 Most Notorious Organized Cybercrime Syndicates</h2>
<p>Here are some of the most infamous organized cybercrime groups in history.</p>
<h3>1. Cobalt Cybercrime Gang</h3>
<p>The <a href="https://www.europol.europa.eu/newsroom/news/mastermind-behind-eur-1-billion-cyber-bank-robbery-arrested-in-spain">Carbanak and Cobalt malware attacks</a>, which attacked 100 financial firms in more than 40 countries around the globe, were carried out by this cybercrime organization. These thieves were able to plunder over $11 million in every heist thanks to their sophisticated cybercrime campaigns targeting multiple banks. It cost the banking sector more than a billion dollars in total losses.</p>
<p>A typical Cobalt assault compromised financial firms by targeting bank personnel using spear-phishing emails with malware attachments. After the malware was downloaded, hackers acquired access to the compromised computer and breached the internal network system. They examined the bank&#8217;s processes and routines for months inside the infiltrated networks.</p>
<p>When they began hacking the systems that controlled the ATMs, things became much more horrific. During the final robbery, ATMs were programmed to remotely disburse cash at scheduled intervals at designated points, where a money mule awaited to collect the funds, a technique known as &#8220;jackpotting.&#8221;</p>
<p>The suspected ringleader was apprehended in 2018, but authorities now believe the surviving members have carried on from where he had left off after witnessing similar attacks on several other institutions immediately after his capture.</p>
<h3>2.    Lazarus Gang</h3>
<p>The <a href="https://www.latimes.com/nation/la-fg-lazarus-group-20170518-story.html">Lazarus group</a>, which some suspect is tied to North Korea, is responsible for many heinous cyberattacks on organizations and institutions. The most well-known of them was the Sony Pictures hack in 2014, as well as the insidious WannaCry cyber-attack that crippled England&#8217;s NHS (National Health Service).</p>
<h4>Sony Pictures Leak</h4>
<p>Employees were surprised to learn that their company&#8217;s network had been compromised during the notorious Sony Pictures incident. Hackers seized terabytes of sensitive information, destroyed specific files, and threatened to release the data if Sony did not comply with their demands.</p>
<p>For days, systems were offline, and whiteboards had to be used by staff. After a few days, the hackers began exposing classified info that they had stolen to the media.</p>
<h4>WannaCry Ransomware Attack</h4>
<p>The Lazarus organization is also suspected of being responsible for the WannaCry ransomware assault in 2017, which infected over a quarter-million systems in 150 countries. It devastated several businesses and institutions, such as the NHS in the United Kingdom. It was the worst attack on the NHS in its history.</p>
<p>WannaCry paralyzed the NHS for days, canceling over 6,000 appointments and costing them approximately $100 million.</p>
<h3>3. MageCart Syndicate</h3>
<p>This large <a href="https://www.riskiq.com/what-is-magecart/">e-commerce hacking ring</a>, which was made up of various gangs operating under a single umbrella, became known for collecting consumer and credit card information. This was accomplished by malware used for software skimming, which intercepted payment services on e-commerce websites and recorded credit card information. Scores of e-commerce platforms, and other sites where customers regularly provide their credit card information, have been attacked by MageCart gangs over the years.</p>
<p>A MageCart group, for example, breached British Airways&#8217; data in 2018. Customers&#8217; financial and personal information was compromised in the incident, which affected 380,000 people. The assault on the airline, however, was only the beginning.</p>
<p>A few days following the British Airways hack, MageCart launched a large credit card skimming operation against hardware vendor Newegg. MageCart is also suspected of being behind the Ticketmaster data breach, which exposed the personal information of 40,000 customers.</p>
<h3>4. Evil Corp</h3>
<p>The name of the organization alone suggests that they are looking to initiate chaos. This <a href="https://krebsonsecurity.com/2019/12/inside-evil-corp-a-100m-cybercrime-menace/">global cybercrime organization</a>, located in Russia, utilizes various viruses to attack a variety of entities, such as a Pennsylvania school system.</p>
<p>Many of their victims are European and American institutions, and they have eluded capture for years. The sophisticated Dridex banking Trojan, which allowed Evil Corp to steal login details from numerous banks and other financial institutions spanning 40 countries, has made the cybercriminal gang famous. Evil Corp was able to steal approximately $100 million at the peak of the Dridex operation.</p>
<p>They&#8217;re so brazen that videos of the suspected leaders parading their sportscars and extravagant lifestyles have gone viral. While U.S. authorities legally charged them in December 2019, numerous analysts believe that bringing their leaders to trial in the U.S. will be tough.</p>
<p>The group was unaffected by the charges. Evil Corp has been associated with a series of new assaults against small and medium-sized businesses in the United States in 2020. This involves Symantec&#8217;s discovery of a plot to target hundreds of U.S. firms in June 2020. WastedLocker, a new type of ransomware, was used to target eight Fortune 500 firms.</p>
<h3>5. GozNym Gang</h3>
<p>The terrifying <a href="https://www.europol.europa.eu/newsroom/news/goznym-malware-cybercriminal-network-dismantled-in-international-operation">GozNym malware</a>, a potent Trojan hybrid designed to elude discovery by security software, is the work of this worldwide cybercrime network.</p>
<p>GozNym is a two-headed beast that combines Nymaim with Gozi malware. Thanks to the nefarious union, the malware could infiltrate a customer&#8217;s PC via malicious email attachments or URLs. The malware then remained practically undetected, lying in wait for a person to log into a bank account.</p>
<p>Login credentials were taken, funds were swiped and routed away to U.S. and overseas accounts, and then money mules laundered it all clean. Over 41,000 machines were hacked, and account holders were defrauded of more than $100 million.</p>
<p>Europol has reported that the perpetrators behind GozNym malware have since been dismantled.</p>
<h3>6. DarkSide</h3>
<p>The Colonial Pipeline ransomware operation last May, which halted the U.S. Colonial Pipeline&#8217;s fuel distribution system, causing gasoline supply issues, was <a href="https://www.npr.org/2021/06/10/1005093802/inner-workings-of-darkside-cybergang-reveal-its-run-like-any-other-business">carried out by DarkSide</a>.</p>
<p>The gang initially appeared in August of last year. It primarily targets being large corporations that will be damaged if their services are disrupted — a crucial factor because they are more inclined to shell out ransom if their services are disrupted. Cyber insurance is more common in such businesses, which implies easy money for crooks.</p>
<p>DarkSide&#8217;s business strategy is to provide ransomware services. To put it another way, it executes ransomware assaults in place of other unknown culprits to reduce their culpability. The loot is subsequently split between the executor and the mastermind.</p>
<p>Cybercrime-as-a-service providers also offer online forums for anyone who wants to enhance their hacking capabilities. This might include instructing someone on how to mix DDoS and ransomware assaults to increase the pressure on a negotiation. A ransomware assault would keep a company from acting on previous and present orders, whereas a DDoS attack will prevent any new orders from being placed.</p>
<h3>7. REvil</h3>
<p>Because of the ongoing Kaseya issue and another recent attack on international meat processing giant JBS, the ransomware-as-a-service outfit <a href="https://www.bbc.com/news/technology-57826851">REvil has made headlines</a>. This organization has been quite aggressive in 2020 and 2021.</p>
<p>REvil hacked Quanta Computer, a Taiwan business that assembles Apple computers, in April and obtained technical data about upcoming Apple devices. A sum of $50 million has been demanded to stop the public dissemination of the stolen information. It is unknown whether this payment was made.</p>
<h3>8. Clop</h3>
<p><a href="https://techcrunch.com/2021/06/23/clop-ransomware-gang-doxes-two-new-victims-days-after-police-raids/">Clop ransomware </a>was launched in 2019 by a profit-driven gang accountable for stealing half a billion dollars. The Clop group specializes in &#8220;double-extortion,&#8221; which entails paying a ransom in return for a decryption key that allows the company to regain access to stolen information. On the other hand, victims will have to pay an additional ransom to prevent the data from being made public.</p>
<p>According to historical evidence, companies that have previously paid a ransom are more willing to do so again in the future. As a result, hackers will repeatedly attack the same firms, requesting a larger amount each time.</p>
<h3>9. Syrian Electronic Army</h3>
<p><a href="https://www.fbi.gov/news/stories/two-from-syrian-electronic-army-added-to-cybers-most-wanted">The Syrian Electronic Army</a>, unlike most cybercrime gangs, has been waging online attacks to spread political propaganda since 2011. They&#8217;ve been labeled a hacktivist organization because of their motivation.</p>
<p>While the organization has ties to Bashar al-, Assad&#8217;s dictatorship, it&#8217;s most probably composed of online vigilantes attempting to act as a media wing for the Syrian army.</p>
<p>Their strategy is to disseminate fake news via credible outlets. In 2013, they published a single tweet from the official handle of the Associated Press, the world&#8217;s largest news organization, that caused the stock market to plummet by billions of dollars.</p>
<p>The Syrian Electronic Army takes advantage of the fact that most online users interpret and respond to information with an inherent trust. They&#8217;re also a prime illustration of how the lines between criminal and terrorist organizations online are less clear than in the real world.</p>
<h3>10. FIN7</h3>
<p><a href="https://apt.thaicert.or.th/cgi-bin/showcard.cgi?g=FIN7">FIN7, a Russian-based organization</a>, is possibly the most successful organized cybercrime syndicate in history. It has been in operation since 2012 and primarily serves as a business.</p>
<p>For years, most of its activities went unnoticed. Its security breaches have made use of cross-attack events, in which a cyber-attack is used for several objectives. For instance, it may facilitate ransomware extortion while also enabling the perpetrator to exploit victims&#8217; data by selling it to another party.</p>
<p>In 2017, FIN7 was accused of being behind a cyberattack on corporations that filed documents with the Securities and Exchange Commission in the United States. This private data was exploited and utilized to extort a ransom, which was subsequently invested in the stock market.</p>
<p>As a result, the groups profited handsomely from the trade of classified material. Because the hacking-enabled insider trading scam lasted so long, it&#8217;s impossible to calculate the exact measure of financial damage. However, it is believed to be in the billions of dollars.</p>
<h2>Takeaway Points</h2>
<p>One of the most critical measures in the battle against organized cybercrime syndicates is understanding how they work. Experts hope that by analyzing them, they will be able to prevent attacks before they occur.</p>
<p>Professionals in the field of cybersecurity can also help. Organizations can gain from cybersecurity experts who can assist them in evaluating their security protocols regularly, recognize potential weaknesses, and devise new ways to protect mission-critical data. Furthermore, cybersecurity consultants can aid in employee education by updating them with the latest hacker avoidance techniques and secure online behaviors.</p>
<p>Need help with cybersecurity? <a href="https://christianespinosa.com/cerberus-sentinel/" target="_blank" rel="noopener">Connect with me.</a></p>
<p><!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-wrapper"><span id="hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-node hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665"><!-- [if lte IE 8]>


<div id="hs-cta-ie-element"></div>


<![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665" target="_blank" rel="noopener"><img decoding="async" id="hs-cta-img-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-img alignleft" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665.png" alt="Check Out The Smartest Person in The Room" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(7462611, '94f60ee8-4fbe-483b-8a0f-ad83ab12a665', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Top 10 Organized Cybercrime Syndicates' data-link='https://christianespinosa.com/blog/top-10-organized-cybercrime-syndicates/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Top 10 Organized Cybercrime Syndicates' data-link='https://christianespinosa.com/blog/top-10-organized-cybercrime-syndicates/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/top-10-organized-cybercrime-syndicates/">Top 10 Organized Cybercrime Syndicates</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/top-10-organized-cybercrime-syndicates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 10 Largest Healthcare Data Breaches by Number of Records Stolen</title>
		<link>https://christianespinosa.com/blog/top-10-largest-healthcare-data-breaches-by-number-of-records-stolen/</link>
					<comments>https://christianespinosa.com/blog/top-10-largest-healthcare-data-breaches-by-number-of-records-stolen/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Fri, 03 Sep 2021 17:48:42 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[incident]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2602</guid>

					<description><![CDATA[<p>Data breaches impact millions and millions, if not billions, of individuals in today&#8217;s data-driven society. The amount of circulating data has increased because of digitalization, and security breaches have risen in tandem as cybercriminals prey on people&#8217;s daily data reliance. Healthcare data breaches have increased in both scale and regularity during the last decade, with [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/top-10-largest-healthcare-data-breaches-by-number-of-records-stolen/">Top 10 Largest Healthcare Data Breaches by Number of Records Stolen</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Top 10 Largest Healthcare Data Breaches by Number of Records Stolen' data-link='https://christianespinosa.com/blog/top-10-largest-healthcare-data-breaches-by-number-of-records-stolen/' data-app-id-name='category_above_content'></div><p><img decoding="async" class=" wp-image-2603 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/09/arget-zvHhKiVuR9M-unsplash-300x169.jpg" alt="healthcare data breach" width="378" height="211" />Data breaches impact millions and millions, if not billions, of individuals in today&#8217;s data-driven society. The amount of circulating data has increased because of digitalization, and security breaches have risen in tandem as cybercriminals prey on people&#8217;s daily data reliance.</p>
<p>Healthcare data breaches have increased in both scale and regularity during the last decade, with the worst breaches affecting up to 80 million people. These breaches frequently leak incredibly sensitive data, ranging from personally identifiable information like names, addresses, and Social Security numbers to personal health information like health insurance information, patients&#8217; past medical history, and Medicaid ID numbers. In this article, we have compiled 10 of the largest data breaches by the number of stolen records.</p>
<h2>Top 10 Largest Data Breaches by Number of Stolen Records</h2>
<h3>10.  Newkirk Products</h3>
<ul>
<li><strong>Number of Stolen Records: <span style="color: #ff0000;">3.47 million</span></strong></li>
<li><strong>Date Discovered: </strong>July 6, 2016</li>
</ul>
<p>Newkirk Products, a provider of healthcare ID cards, revealed <a href="https://www.prnewswire.com/news-releases/newkirk-products-inc-provides-notice-of-data-breach-300309995.html">a data breach in mid-2016 involving approximately 3.47 million individuals</a>. Multiple branches of Blue Cross Blue Shield, one of the major health insurance companies in the United States by enrollment, were among those affected.</p>
<p>The attacker was able to get unauthorized access to information by exploiting a vulnerability in the third-party software&#8217;s administrative portal on a single isolated server. Hackers acquired access to sensitive personal information such as names, birthdates, Medicaid ID numbers, group ID numbers, and premium invoice information, and in addition to primary care provider information. There was no financial information, medical records, insurance claim data, or social security numbers on the server.</p>
<p>To date, Newkirk has found no evidence that such information has been misused. Those affected by the data breach were sent letters that included an explanation of the occurrence, an offer of free identity protection services for two years, and advice on other ways to safeguard themselves.</p>
<h3>9.  Banner Health</h3>
<ul>
<li><strong>Number of Stolen Records: <span style="color: #ff0000;">3.62 Million</span></strong></li>
<li><strong>Date Discovered: </strong>late June 2016</li>
</ul>
<p>Banner Health, a healthcare company based in Arizona, revealed in mid-2016 that <a href="https://www.usatoday.com/story/news/nation-now/2016/08/03/banner-health-cyberattack-breaches-records/88040778/">3.62 million patients&#8217; data had been exposed due to a cyber-attack</a>. Banner contracted a cybersecurity expert to investigate after staff saw strange activity on its private servers. The firm identified two intrusions in which hackers acquired patient information and payment system data. Names, birth dates, addresses, Social Security numbers, credit card numbers, internal verification codes, expiration dates, as well as doctors&#8217; names, and medical records, may have been compromised.</p>
<p>A <a href="https://www.latimes.com/business/la-fi-ucla-medical-data-20150717-story.html">class-action lawsuit</a> was launched by the victims of the data breach shortly after. The judge dismissed several of the first allegations, but the parties negotiated a provisional settlement in December 2020. According to court records, victims of data breaches will be entitled to file claims for reimbursement of expenses spent because of the violation.</p>
<p>The maximum amount that can be compensated per breach victim is $500 for regular expenses and $10,000 for exceptional costs, including out-of-pocket expenses and missed time due to identity theft or fraud. All breach victims will also receive two years of free credit monitoring from Banner Health, which will not duplicate what was supplied at the health system&#8217;s original breach notification.</p>
<h3>8.  Medical Informatics Engineering</h3>
<ul>
<li><strong>Number of Stolen Records: <span style="color: #ff0000;">3.9 million</span></strong></li>
<li><strong>Date Discovered: </strong>June 10, 2015</li>
</ul>
<p>Medical Informatics Engineering (MIE), an electronic medical records software company, reported <a href="https://www.chiefhealthcareexecutive.com/view/medical-informatics-engineering-pays-100k-for-data-breach-of-35m-patients">a data breach in mid-2015 that compromised at least 3.9 million patients</a>. Patients who were affected received notices in the mail informing them of their stolen PII, including their names, birthdates, mailing addresses, phone numbers, diagnoses, Social Security numbers, and other sensitive data.</p>
<p>According to news outlets, cyber hackers accessed the company&#8217;s network remotely by using credentials that were not consistently secure. According to an investigation, the organization did not do a thorough risk analysis to analyze the possible threats and hazards to the security, integrity, and accessibility of an individual&#8217;s electronic protected health information before the breach occurred. This is a HIPAA-required activity, and <a href="https://medium.com/the-aftermath-of-a-data-breach/medical-informatics-engineering-breach-the-gift-that-keeps-on-giving-9948231d2e95">MIE&#8217;s violation led them to pay $100,000</a> as settlement.</p>
<h3>7.  Advocate Health Care</h3>
<ul>
<li><strong>Number of Stolen Records: <span style="color: #ff0000;">4.03 million</span></strong></li>
<li><strong>Date Discovered:</strong> August 2013</li>
</ul>
<p>Advocate Health Care confirmed <a href="https://www.cnbc.com/2016/08/04/huge-data-breach-at-health-system-leads-to-biggest-ever-settlement.html">three different data breaches</a> affecting Advocate Medical Group (AMG), a doctors&#8217; organization with over 1,000 physicians, from July to November 2013. The initial breach happened on July 15 when AMG&#8217;s administrative headquarters in Park Ridge, Illinois, was robbed of four desktop computers carrying the records of roughly 4 million patients.</p>
<p>The second breach occurred between June 30 and August 15, 2013, when an unauthorized third party gained unauthorized network access to AMG&#8217;s billing service provider, potentially exposing the health records of over 2,000 AMG patients. Then, the last case of stolen PHI involved the theft of a laptop holding the health records of over 2,230 patients from an AMG employee&#8217;s car on November 1, 2013.</p>
<p>Advocate settled a lawsuit over the breach in August 2016 for $5.55 million.</p>
<h3><strong>6. University of California, Los Angeles Health</strong></h3>
<ul>
<li><strong>Number of Stolen Records:<span style="color: #ff0000;"> 4.5 million</span></strong></li>
<li><strong>Date Discovered: </strong>May 5, 2015</li>
</ul>
<p>In mid-2015, the UCLA Health System revealed that hackers gained access to patient records of approximately 4.5 million individuals. Worse yet, UCLA announced that its patient data was not secured, which brought immediate and scathing criticism from security specialists.</p>
<p>In 2019, UCLA Health negotiated a settlement with the 4.5 million present and past patients affected by the patient data leak in a class-action lawsuit. UCLA Health consented to several resolutions as part of the agreement. All class action participants are eligible to sign up for free two-year identity protection services. The health organization also committed to compensating patients for costs paid in attempting to safeguard themselves from identity theft and expenses incurred because of identity theft or fraud. UCLA Health has also committed to revising its cybersecurity policies and practices.</p>
<h3>5.  TRICARE</h3>
<ul>
<li><strong>Number of Stolen Records: <span style="color: #ff0000;">4.9 million</span></strong></li>
<li><strong>Date Discovered: </strong>September 2011</li>
</ul>
<p>Science Applications International Corporation (SAIC) reported a data breach in late 2011 that <a href="https://www.modernhealthcare.com/article/20110929/NEWS/110929951/tricare-reports-data-breach-affecting-4-9-million-patients">affected about 4.9 million military clinic and hospital patients</a> participating in TRICARE, the military healthcare provider for the federal government. This transpired when records were taken from a SAIC staff&#8217;s car.</p>
<p>According to TRICARE authorities, the tapes contain phone numbers, addresses, Social Security numbers, and other sensitive information, including prescriptions, laboratory tests, and clinical notes. They also stated that the records did not contain any financial information, such as bank accounts or credit card numbers.</p>
<p>A <a href="https://www.databreachtoday.com/most-claims-in-tricare-breach-dismissed-a-6834">federal district judge dismissed most of the combined class action lawsuits</a> brought against TRICARE in 2014.</p>
<h3>4.  Community Health Systems</h3>
<ul>
<li><strong>Number of Stolen Records: <span style="color: #ff0000;">6.1 million</span></strong></li>
<li><strong>Date Discovered: </strong>June 2014</li>
</ul>
<p>Community Health Systems (CHS), which manages 200+ hospitals across the United States, disclosed <a href="https://money.cnn.com/2014/08/18/technology/security/hospital-chs-hack/">a serious healthcare breach affecting 6.1 million patients in mid-2014</a>. Attackers took advantage of a software flaw to gain access to personal information such as phone numbers, physical addresses, birthdates, and Social Security numbers. The breach impacted anybody who has received care from an affiliate hospital in the last five years and anybody who had been recommended to CHS by a physician outside of CHS during that time.</p>
<p>CHS enlisted the help of cybersecurity professionals to investigate the breach. They discovered that the hackers were from China and that the attacks took place between April and June of 2014. The cybercriminals utilized high-end, complex malware to carry out their operations.</p>
<p>Federal authorities and cybersecurity consultants informed the hospital network that the attackers had previously committed industrial espionage and stole valuable medical device information. Instead, the intruders stole patient information this time. They were unable to obtain information about patients&#8217; past medical history, clinical procedures, or credit card details.</p>
<p>The breach cost CHS and its partners <a href="https://www.hipaajournal.com/community-health-systems-pays-5-million-to-settle-multi-state-breach-investigation/">$10.4 million in compensation</a>.</p>
<h3>3. Excellus Bluecross Blueshield</h3>
<ul>
<li><strong>Number of Stolen Records: <span style="color: #ff0000;">10+ million</span></strong></li>
<li><strong>Date Discovered: </strong>September 2015</li>
</ul>
<p>Excellus uncovered <a href="https://www.usatoday.com/story/tech/2015/09/10/cyber-breach-hackers-excellus-blue-cross-blue-shield/72018150/">a cyber-attack in August 2015</a> that exposed the personal information of around 10 million members. Following a wave of cyber-attacks in early 2015 that targeted healthcare data, Excellus had its own systems forensically reviewed. What they found ended up being the world&#8217;s third-largest healthcare data breach.</p>
<p>Names, phone numbers, mailing addresses, birth dates, Social Security numbers, and various account information, such as claims and payment details, were all exposed in the breach, which dated back to December 2013.</p>
<p>Excellus will <a href="https://www.cyberscoop.com/excellus-data-breach-fined-hhs-ocr/">pay a $5.1 million fine</a> for violating HIPAA&#8217;s privacy and security standards as part of the settlement.</p>
<h3>2.  Premera Blue Cross</h3>
<ul>
<li><strong>Number of Stolen Records:</strong> <span style="color: #ff0000;"><strong>11+ million</strong></span></li>
<li><strong>Date Discovered: </strong>January 29, 2015</li>
</ul>
<p>Premera Blue Cross revealed in early 2015 that <a href="https://www.forbes.com/sites/katevinton/2015/03/17/11-million-customers-medical-and-financial-data-may-have-been-exposed-in-premera-blue-cross-breach/?sh=59a8166575d9">11 million customers&#8217; medical information had been compromised</a> due to a cyberattack. Hackers were able to put malware on Premera&#8217;s servers using a phishing email, giving them access to the data of its members. The hack disclosed bank account data, birthdates, claims information, and Social Security numbers, among other things. The company found that the first attack took place on May 5, 2014, after working with cybersecurity specialists and the FBI to examine the attack. To resolve suspected HIPAA violations in the security breach, Premera Blue Cross was made to<a href="https://www.healthcareitnews.com/news/premera-blue-cross-pay-685m-settle-massive-2015-breach"> pay $6.85 million </a>and submit a remedial action plan in 2020.</p>
<h3>1.  Anthem Blue Cross</h3>
<ul>
<li><strong>Number of Stolen Records: <span style="color: #ff0000;">78.8 million</span></strong></li>
<li><strong>Date Discovered: </strong>January 29, 2015</li>
</ul>
<p>Anthem revealed in 2015 that <a href="https://abcnews.go.com/Technology/wireStory/anthem-pay-40m-settlement-2015-cyberattack-73340486">78.8 million patient information was stolen</a> in the largest healthcare data breach in history. An anonymous hacker gained access to a database holding personal information such as names, birthdates, addresses, social security numbers, email addresses, and information about jobs and income. According to the company, the hack did not expose credit card or medical information.</p>
<p>Anthem agreed to pay $39.5 million in 2020 to resolve a probe by a consortium of state attorneys general. The corporation also consented to <a href="https://www.nbcnews.com/news/us-news/anthem-pay-record-115m-settle-lawsuits-over-data-breach-n776246">pay $115 million</a> to settle the lawsuit, making it the largest data breach settlement ever.</p>
<p><em><strong>Interested in preventing a data breach? <a href="https://christianespinosa.com/cerberus-sentinel/" target="_blank" rel="noopener">Contact me.</a></strong></em></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Top 10 Largest Healthcare Data Breaches by Number of Records Stolen' data-link='https://christianespinosa.com/blog/top-10-largest-healthcare-data-breaches-by-number-of-records-stolen/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Top 10 Largest Healthcare Data Breaches by Number of Records Stolen' data-link='https://christianespinosa.com/blog/top-10-largest-healthcare-data-breaches-by-number-of-records-stolen/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/top-10-largest-healthcare-data-breaches-by-number-of-records-stolen/">Top 10 Largest Healthcare Data Breaches by Number of Records Stolen</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/top-10-largest-healthcare-data-breaches-by-number-of-records-stolen/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ransomware – Should You Pay?</title>
		<link>https://christianespinosa.com/blog/ransomware-should-you-pay/</link>
					<comments>https://christianespinosa.com/blog/ransomware-should-you-pay/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Fri, 03 Jul 2020 01:12:45 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=1996</guid>

					<description><![CDATA[<p>Last night I watched an episode of Chicago Med (Season 2, Episode 19). It happened to be about ransomware. Chicago Med was infected with ransomware, rendering all computer systems (doctor’s tablets, MRI machines, patient history systems, diagnostic systems, etc.) useless. The staff of Chicago Med had to resort to “manually” doing everything – filling out paper [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/ransomware-should-you-pay/">Ransomware – Should You Pay?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Ransomware – Should You Pay?' data-link='https://christianespinosa.com/blog/ransomware-should-you-pay/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="alignright wp-image-2329 " src="https://christianespinosa.com/wp-content/uploads/2020/07/ransomwareaffectinghospital-chicagomed.jpg" alt="cybersecurity certifications" width="440" height="245" data-wp-editing="1" />Last night I watched an episode of <a href="https://g.co/kgs/Dei6hQ" target="_blank" rel="noopener noreferrer">Chicago Med (Season 2, Episode 19)</a>. It happened to be about ransomware. Chicago Med was infected with ransomware, rendering all computer systems (doctor’s tablets, MRI machines, patient history systems, diagnostic systems, etc.) useless. The staff of Chicago Med had to resort to “manually” doing everything – filling out paper lab requests, using a whiteboard for patient status, using old school methods to diagnose patients, etc.</p>
<div id="block-c5f976c6b56c55c4c52e" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<p class="">A debate ensued about whether Chicago Med should just pay the ransom, which was around $30k. The staff had differing opinions in the episode.</p>
<p class=""><strong><em>This is a debate worth discussing, as I do not see a clear answer to the question “should I pay the ransom”, other than “it depends”.</em></strong></p>
</div>
</div>
<div id="block-yui_3_17_2_1_1581274001599_85116" class="sqs-block image-block sqs-block-image sqs-col-5 span-5 float float-right sqs-text-ready" data-block-type="5">
<div id="yui_3_17_2_1_1582181276081_366" class="sqs-block-content">
<div id="yui_3_17_2_1_1582181276081_365" class="image-block-outer-wrapper layout-caption-below design-layout-inline combination-animation-none individual-animation-none individual-text-animation-none sqs-narrow-width">
<div class="image-block-wrapper has-aspect-ratio" style="outline: 0px; vertical-align: baseline; background: 0px 0px; margin: 0px; padding: 0px;" data-animation-tier="1" data-description="&lt;p class=&quot;&quot;&gt;The reliance on medical technology makes manually processes like this prone to mistakes&lt;/p&gt;"></div>
<div id="yui_3_17_2_1_1582181276081_364" class="intrinsic">
<div class="image-caption-wrapper">
<div class="image-caption">
<div id="attachment_3140" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="wp-image-3140 lazyloaded" src="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/chicagomed-manualprocesses.jpg" sizes="(max-width: 431px) 100vw, 431px" srcset="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/chicagomed-manualprocesses.jpg 250w, https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/chicagomed-manualprocesses-206x113.jpg 206w" alt="Ransomware Attack - Manual method" width="431" height="235" aria-describedby="caption-attachment-3140" data-lazy-srcset="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/chicagomed-manualprocesses.jpg 250w, https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/chicagomed-manualprocesses-206x113.jpg 206w" data-lazy-sizes="(max-width: 431px) 100vw, 431px" data-lazy-src="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/chicagomed-manualprocesses.jpg" data-was-processed="true" /></p>
<p id="caption-attachment-3140" class="wp-caption-text">The reliance on medical technology makes manually processes like this prone to mistakes</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="block-yui_3_17_2_1_1581274001599_85409" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<p class="">I tend to look at everything from a risk perspective. Sure, it’s easy to say “our policy is we do not pay the ransom”, but at what cost? Many people have polarizing opinions on just about everything, including this topic. It’s easy to make recommendations from afar. What if your spouse was in a hospital and needed immediate emergency treatment, but treatment was delayed because of ransomware? Every second in this delay increased the risk that your spouse might die. Would you still support the policy “we do not pay the ransom”, even if it meant your spouse may die? Is $30k worth more than your spouse?</p>
<p class="">Also, the rationale for the “we do not pay the ransom” policy goes something like this – “if the hackers know we do not pay the ransom, they won’t attack us”. This is flawed logic because many cybercriminals release ransomware into the “wild”, non-directed, to spread to as many systems as possible, so they can maximize odds of success and returns.</p>
<p class="">The Chicago Med hospital administrator was adamant about not paying the ransom, but one of the doctors paid the ransom himself. After the ransom was paid, all the systems came back online and everything went back to “normal”. The doctor that paid the ransom simply stated that the risk was too great and that he had calculated the ROI and it was an easy decision.</p>
<p class=""><em>But, wait…what if you pay the ransom and the hackers just take your money and don’t decrypt your systems? </em></p>
<p class="">This is certainly a possibility, although it is almost never the case. Most cybercriminals are in the business of making money, so their business models support this objective. Cybercriminals probably analyze risk in greater depth than most IT Staff of Cybersecurity Staff.</p>
<p class="">Risk is a real issue that is almost always overlooked. Sure, screw paying the ransom if:</p>
<ul>
<li>Your IT/Cybersecurity Staff has an up-to-date and rehearsed Incident Response Plan</li>
<li>Your IT/Cybersecurity Staff has current, up-to-date backups that can be restored quickly</li>
<li>Your IT/Cybersecurity Staff can source the ransomware infection and prevent it from occurring again after the backup restoration</li>
<li>Your IT/Cybersecurity Staff knows which vulnerability the ransomware exploited</li>
<li>Your IT/Cybersecurity Staff knows the extent of the infection – did the infection hit the backup systems?</li>
</ul>
<p class="">In the Chicago Med episode, they had to end up diverting patients to other hospitals because of the ransomware. The Chicago Med IT Staff seemingly did not have a plan, at least a timely one, to restore the hospital systems.</p>
<p class="">I’m certainly not advocating people pay the ransom, but blindly making blanket policies without understanding risk is a huge problem, especially at places where time is of the essence, such as hospitals.</p>
<h2>So, what can you do to help with RANSOMWARE? I recommend 3 things to start:</h2>
<ol data-rte-list="default">
<li>
<p class=""><strong>Perform a risk assessment against your environment</strong> – identify your critical assets (data and systems). Not everything is critical. Narrowing your focus to what is critical, then prioritizing accordingly allows you to better protect these systems and restore them in a prioritized manner. Too many organizations try to equally protect everything. This is a huge mistake, as everything is half-ass protected, which doesn’t cut it. It’s better to protect your 10 critical assets 100% and leave the 90 noncritical assets at 50%. This is better than all 100 assets being protected at 60%, which is a common mistake.</p>
</li>
<li>
<p class="">Once you know your critical systems, make sure those systems (and the applications installed on them) are <strong>patched routinely and that they are backed up</strong> (the system itself as well as the data on the system) as frequently as needed.</p>
</li>
<li>
<p class=""><strong>Critical system backups security and testing. Make sure the backup system is secure.</strong> If the ransomware hits the backup system, the backups are no good. Also, make sure you know how to restore from backups. This seems simple, yet it is often overlooked. I’ve seen many organizations back up their data routinely and religiously and never once test the restoration procedures. During an incident, they found out that the restoration procedures did not work at all or only partially worked.</p>
</li>
</ol>
<p class="">If you’re unclear on how to perform the risk assessment or need help with a cybersecurity plan, Alpine Security can help you with our <a href="https://alpinesecurity.com/services/ciso-as-a-service/" target="_blank" rel="noopener noreferrer">CISO-as-a-Service</a>.</p>
</div>
</div>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Ransomware – Should You Pay?' data-link='https://christianespinosa.com/blog/ransomware-should-you-pay/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Ransomware – Should You Pay?' data-link='https://christianespinosa.com/blog/ransomware-should-you-pay/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/ransomware-should-you-pay/">Ransomware – Should You Pay?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/ransomware-should-you-pay/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>70% of Cyber Attacks Will Be Against Small Businesses in 2020</title>
		<link>https://christianespinosa.com/blog/70-of-cyber-attacks-will-be-against-small-businesses-in-2020/</link>
					<comments>https://christianespinosa.com/blog/70-of-cyber-attacks-will-be-against-small-businesses-in-2020/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Fri, 24 Jan 2020 05:58:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[smb cyberattack]]></category>
		<guid isPermaLink="false">https://cespinosa.wpengine.com/?p=813</guid>

					<description><![CDATA[<p>Introduction In 2020 it is estimated the percentage of cyber attacks against small businesses will be close to 70%. It’s also estimated that in 2020 the cost of cyber attacks is going to be around $5 trillion. That’s trillion with a T. And if 70% of the attacks are against small businesses, then obviously the [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/70-of-cyber-attacks-will-be-against-small-businesses-in-2020/">70% of Cyber Attacks Will Be Against Small Businesses in 2020</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='70% of Cyber Attacks Will Be Against Small Businesses in 2020' data-link='https://christianespinosa.com/blog/70-of-cyber-attacks-will-be-against-small-businesses-in-2020/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="alignright wp-image-2329 " src="https://christianespinosa.com/wp-content/uploads/2020/03/70-attack.jpg" alt="cybersecurity certifications" width="440" height="245" data-wp-editing="1" /></p>
<h2>Introduction</h2>
<p id="yui_3_17_2_1_1582182926481_1729">In 2020 it is estimated the percentage of cyber attacks against small businesses will be close to 70%. It’s also estimated that in 2020 the cost of cyber attacks is going to be around $5 trillion. That’s trillion with a T. And if 70% of the attacks are against small businesses, then obviously the small businesses are going to be paying for a lot of that $5 trillion. Cyber attacks affect small businesses in a few ways. This post discusses how cyber attacks affect small businesses and what can be done about it.</p>
<h2>The Effect of Ransomware and Stolen Data on Small Business</h2>
<p>One way cyberattacks affect a small business is if a small business is attacked with something such as ransomware. The ransomware can render systems useless for maybe one week or two weeks. So the small business can’t provide the service they need to provide to generate revenue or they can’t produce the product they need to produce to generate revenue. So basically they’re dead in the water for one or two weeks and they can’t produce anything to generate revenue. That alone can take a small business out of business.  </p>
<p>The other primary method or primary way that small businesses have to pay for a cyber attack is if a small business’s client data is stolen. Typically, for every record that’s stolen the small business has to pay for credit monitoring for all those records. There’s a clinic in Missouri that was put out of business. They had 20,000 patient records stolen by an attacker. They had to pay for credit monitoring for all 20,000 of those patients. The credit monitoring, I’m not exactly sure the price, but I think it was around $20 per person. So if you had 20,000 records stolen and you have to pay $20 per record, that’s $400,000 that that small business had to pay per year in credit monitoring fees. Most small businesses do not have a cash reserve of $400,000 so that took that clinic out of business.</p>
<h2>Why Do Cybercriminals Attack Small Businesses?</h2>
<p>You may ask yourself, “Why do attackers go after small businesses? Why is the percentage so high towards small businesses?” There are two main reasons. The first reason is most small businesses do not have a very mature cybersecurity program. They don’t have a dedicated staff to solely work on cybersecurity, it’s typically somebody’s additional duty. The attackers know this and they know that they can more easily get into a small business than a larger business because most large organizations have a dedicated cybersecurity staff and a mature cybersecurity program.</p>
<p>The second reason is attackers will attack a small business and use that business as a foothold to attack a larger business. Small businesses typically have relationships with larger businesses. If the large business is fairly secure but the small business is not, the attacker’s going to go after the small business and then leverage that relationship from the small business to attack the larger business.</p>
<p>An example of this is Target. Target’s a large store. Obviously, they’re all over the place, but Target wasn’t attacked directly because they have a fairly mature cybersecurity program. The HVAC vendor or heating, ventilation and air conditioning vendor was attacked. The HVAC vendor for Target was a small business. So the attackers attacked the HVAC vendor and then from there, they leveraged the HVAC vendor’s relationship with Target. The attackers rode the trusted connection from the HVAC vendor to attack Target and compromise Target’s point of sale machines which stole everyone’s credit card numbers.</p>
<p>As a recap, the two reasons small businesses are attacked:</p>
<ol>
<li>They are typically not very mature in the cybersecurity maturity process</li>
<li>They are often leveraged to attack the larger business</li>
</ol>
<h2>What Can You Do?</h2>
<p>My company, Alpine Security believes small businesses are vital to the economy. We’re a small business and we want to support other small businesses. So we’ve come up with our fractional virtual CISO service – that offers an affordable means for small businesses to develop cybersecurity capabilities in alignment with risk tolerance, industry, and business objectives. To learn more about our CISO service, you can call us at (844) 925-7463, email us at info@alpinesecurity.com, or visit: <a href="https://alpinesecurity.com/services/ciso-as-a-service/" target="_blank" rel="noopener noreferrer">https://alpinesecurity.com/services/ciso-as-a-service/</a></p>
<p>It is in our interest to help small business owners protect your environment from being attacked.</p>
<p><iframe title="90% of Small Business Owners will Ignore this in 2020: 70% of Cyber Attacks Will Be Against Them" width="500" height="281" src="https://www.youtube.com/embed/G97qEvwE8_I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><!-- /wp:paragraph --></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='70% of Cyber Attacks Will Be Against Small Businesses in 2020' data-link='https://christianespinosa.com/blog/70-of-cyber-attacks-will-be-against-small-businesses-in-2020/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='70% of Cyber Attacks Will Be Against Small Businesses in 2020' data-link='https://christianespinosa.com/blog/70-of-cyber-attacks-will-be-against-small-businesses-in-2020/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/70-of-cyber-attacks-will-be-against-small-businesses-in-2020/">70% of Cyber Attacks Will Be Against Small Businesses in 2020</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/70-of-cyber-attacks-will-be-against-small-businesses-in-2020/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
