Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Cybercriminals recruit insiders to attack telecoms providers
Posted on 25-Aug-2016 23:27 | Tags Filed under: News



Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, recruiting disaffected employees through underground channels or blackmailing staff using compromising information gathered from open sources - according to a Kaspersky Lab intelligence report into security threats facing the telecommunications industry. 

 

Telecommunications providers are a top target for cyber-attack. They operate and manage the world’s networks, voice and data transmissions and store vast amounts of sensitive data. This makes them highly attractive to cybercriminals in search of financial gain, as well as nation-state sponsored actors launching targeted attacks, and even competitors. 

 

To achieve their goals, cybercriminals often use insiders as part of their malicious ‘toolset’, to help them breach the perimeter of a telecommunications company and perpetrate their crimes. New research by Kaspersky Lab and B2B Internationali reveals that 28% of all cyber-attacks, and 38% of targeted attacks now involve malicious activity by insiders. The intelligence report examines popular ways of involving insiders in telecoms-related criminal schemes and gives examples of the things insiders are used for.

 

According to the Kaspersky Lab researchers, attackers engage or entrap telecoms employees in the following ways: 

 

  • Using publically available or previously-stolen data sources to find compromising information on employees of the company they want to They then blackmail targeted individuals – forcing them to hand over their corporate credentials, provide information on internal systems or distribute spear-phishing attacks on their behalf. 
  • Recruiting willing insiders through underground message boards or through the services of “black recruiters”. These insiders are paid for their services and can also be asked to identify co-workers who could be engaged through 

The blackmailing approach has grown in popularity following online data breaches such as the Ashley Madison leak, as these provide attackers with material they can use to threaten or embarrass individuals.  

 

According to the Kaspersky Lab researchers, if an attack on a cellular service provider is planned, criminals will seek out employees who can provide fast track access to subscriber and company data or SIM card duplication/illegal reissuing. If the target is an Internet service provider, the attackers will try to identify those who can enable network mapping and man-in-the-middle attacks. 

 

However, insider threats can take all forms. The Kaspersky Lab researchers noted two non-typical examples, one of which involved a rogue telecoms employee leaking 70 million prison inmate calls, many of which breached client-attorney privilege. In another example, an SMS center support engineer was spotted on a popular DarkNet forum advertising their ability to intercept messages containing OTP (One-Time Passwords) for the two-step authentication required to login to customer accounts at a popular fintech company. 

 

“The human factor is often the weakest link in corporate IT security. Technology alone is rarely enough to completely protect the organization in world where attackers don’t hesitate to exploit insider vulnerability. Companies can start by looking at themselves the way an attacker would. If vacancies carrying your company name, or some of your data, start appearing on underground message boards, then somebody, somewhere has you in their sights. And the sooner you know about it the better you can prepare,” – said Denis Gorchakov, security expert, Kaspersky Lab. 

 



More information: https://securelist.com/analysis/publications/...




comments powered by Disqus


Trending now »

Hot discussions in our forums right now:

Bombing at Manchester concert, 19 dead
Created by Rikkitic, last reply by Rikkitic on 28-May-2017 19:06 (174 replies)
Pages... 10 11 12


How much power do you use?
Created by tchart, last reply by floydie on 29-May-2017 20:50 (48 replies)
Pages... 2 3 4


Tax Cuts
Created by tdgeek, last reply by Fred99 on 29-May-2017 22:15 (113 replies)
Pages... 6 7 8


The President Of The USA: Donald Trump
Created by TimA, last reply by frankv on 29-May-2017 09:55 (4373 replies)
Pages... 290 291 292


Tipping? Please no!
Created by BlueShift, last reply by cddt on 27-May-2017 10:10 (104 replies)
Pages... 5 6 7


NZ Herald - Internet providers have backdoor access to customers' modems
Created by RunningMan, last reply by jeffory123 on 29-May-2017 23:12 (47 replies)
Pages... 2 3 4


Any Tom Bihn bag users on GZ?
Created by Geektastic, last reply by Geektastic on 29-May-2017 18:17 (14 replies)

Molemaps and recommended plastic surgeons for removal.
Created by Paul1977, last reply by MikeAqua on 29-May-2017 14:05 (13 replies)