Page 240 - Cyber Defense eMagazine September 2025
P. 240

It’s important that everyone in the organization be educated about how to protect against both types of
            attacks.  Data is an asset, and its protection can no longer just be delegated to IT without oversight and
            understanding.



            The Threat is Already Inside Your Network

            Most organizational leaders want to believe that an internal threat isn’t likely.  After all, who wants to work
            with people who would steal?  Sadly, most organizations learn the hard way, because they can’t imagine
            that a data breach will happen to them. In fact, many organizations still view a data breach as an unlikely
            scenario, with odds similar to being hit by a tornado or a fire. So many assume that if they are not a
            household  name  with  millions  of  customers,  they  will  be  poor  targets.  Still  others,  believe  they  are
            adequately prepared but never run simulated exercises to check. But the odds are that much higher –
            nearly 1/3 of organizations will get hit by a data breach this year.

            So why are so many breaches still occurring? The fact is, most people are working off some erroneous
            assumptions, particularly around their use of data encryption. While many security personnel proudly
            announce that all their data is encrypted in transit and at rest, what no one has been acknowledging is
            the dirty secret that once systems are in use, all that protection goes away.  Most organizations never
            shut down their applications (even after hours, if they do not run continuously) so their data is always
            vulnerable, to anyone (known and unknown) inside the perimeter.

            The  recent  Coinbase  data  breach  is  a  great  example.  The  breach  did  not  result  from  a  technical
            vulnerability in its systems, but rather was perpetuated from within, by support staff who abused their
            legitimate access to steal the data in return for relatively modest bribes. The breach compromised the
            sensitive  personally  identifiable  information  (PII)  of  almost  70,000  users,  along  with  account-related
            information such as balance snapshots and transaction histories. This unauthorized activity happened
            over the course of almost 6 months before being discovered.  As a result, Coinbase is facing at least six
            class action lawsuits alleging that Coinbase failed to implement and maintain adequate security protocols,
            exposing users to serious risks. In response to the breach, Coinbase has refused to pay the $20 million
            US ransom demand and instead offered a $20 million reward for information leading to the identification
            and prosecution of the attackers. The company estimates that the incident could cost between $180
            million and $400 million, accounting for remediation efforts and reimbursements to affected users.

            In  another  example,  Capital  One  experienced  an  enormous  data  breach  in  2019,  due  to  a
            misconfiguration of their cloud infrastructure (specifically a misconfigured Web Application Firewall). This
            vulnerability was then exploited to access sensitive data from over 100 million customers, including credit
            scores and banking details. Unfortunately, this is not an isolated incident. System administrators often
            have too much access to organizational data compounded by them escalating their access privileges
            without the knowledge of management.


            In another notable instance, in 2024, a hacker broke into AT&T’s cloud storage provider, Snowflake, and
            accessed call and text records for almost all their 109 million US customers. Although AT&T claims that
            no names were attached to the stolen data, the breach led to multiple class action lawsuits were just
            recently settled for $177 million US.





            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          240
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   235   236   237   238   239   240   241   242   243   244   245