F5.5G Leap-forward Development of Broadband in Africa The Africa Broadband Forum 2024 (BBAF 2024) was successfully held in Cape Town, South Africa recently, under…
How can businesses protect themselves from cybercrime in 2015?
Last year was a difficult time for businesses when it came to cybercrime. In the US, organisations including Sony and eBay were compromised when hackers tried to steal personal and company information. But probably the biggest event of 2014 was Heartbleed, a flaw in the OpenSSL system that exposed internet users’ passwords and allowed hackers to steal information.
Closer to home, the South African Post Office lost R42 million when it became a victim of hacking and a number of local websites, including Starbase Telecoms and Infoware Studios, were compromised in a mass hacking of outdated content systems. Most concerning was the attack on a South African Police Service-run website, which revealed the identities of whistleblowers, possibly jeopardising their safety.
Cybercrime costs the South African economy a whopping R5.8 billion a year with more than one million South Africans falling victim to cybercrime over the past year. Organisations that do not implement robust security measures – which need to be constantly monitored and adapted to emerging and changing threats – expose themselves and their stakeholders to risk.
What the experts have long referred to as cyberwar is but the trend towards increasingly specific attacks with a targeted objective. These are backed by highly organised groups that use precise and refined techniques, making traditional ‘anti-malware’ solutions highly ineffective. We are seeing that most of these attacks come from Russia or China, but also from other countries like Japan, India and Brazil. Even Spain is on the top of the list of countries producing malware.
The attacks on South African organisations were targeted and confirm the global trend of ‘cyberwar’. ‘Big cybercrime’ is promoted by a new generation of organised groups whose operations are increasingly politically motivated.
There is a huge black market in the world that many people are unaware of. For example, a hacker who discovers an unknown security threat can charge about R500 000 for it, or can command a multi-million-rand fee to plan an attack against a government. Some of the trends and key concepts in the current security landscape in South Africa are:
Distributed Denial of Service (DDoS)
This criminal activity was used to attack the website of various local gaming platforms. This computer attack involves many computers continuously requesting certain information to the attacked network until saturation and, therefore, its downfall.
Advanced Persistent Threats (APTs)
An attack of this type is common against governments, with infiltration attempts from coordinated groups of up to 20 hackers. ATPs are high-profile, sophisticated and carefully constructed attacks, and do not always point to known programs.
Redirecting emails
This method is especially damaging because, in many cases, sufferers are not aware of it, at least for some time. It is the method reported by the State Security Agency, which said its websites and servers had been attacked, redirecting emails from managers to spies, who would extract all kinds of information.
Social engineering
This is the preferred method when launching attacks from malware or phishing techniques to companies and agencies. The ‘hooks’ are varied. For example: hackers will call a person by name, or, if the person is part of the HR department, will send an email entitled ‘Payroll updated’. This technique is associated with one of the most serious illegal intrusions into corporate networks in recent history.
Unknown malware
During 2013, there was a surge of a more intelligent, sophisticated and tougher malware that was established and maintained throughout 2014. Threat emulation sensors revealed that between June and December 2013, one of three organisations downloaded at least one file infected with unknown malware. New complication tools known as ‘crypters’ allowed cybercriminals to evade detection by anti-malware software.
Organised cybercrime groups
Cybercriminals today operate in groups of various sizes and types. Some have very similar structures to any legitimate company, with teams of experts like quality and project managers. Others even have members with expertise in marketing to spread threats and information easily through social networks and forums, from which botnets and malware can spread.
“In conclusion, it is imperative that companies and government agencies identify their critical data and surround them with the necessary safeguards to protect them,” says Hadjizenonos. “The new threat prevention techniques, such as emulation solutions, are presented as an effective protection for the most demanding corporate networks and are critical.”