Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

“Inside the Mind of a Cybercriminal”, Revealed by KnowBe4

The definition of a cybercriminal has evolved through the years. Today, a cybercriminal is a highly sophisticated individual or group of such individuals who have access to advanced technologies and tools to steal sensitive data. In recent times, a cybercriminal has become the single-point source of data fraud, theft and ransomware agents.

What do adversaries and threat actors think as they dive deep into your organization’s defenses?

A cybercriminal comes in many different flavors, but the majority of them are in it for one thing: financial pay-off.

They want the money that comes with offering their tools or services, selling stolen data, extortion like ransomware or plain fraud. And they all have one thing in common – your organization is on their radar. This is why, says Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa it is critical to understand how cybercriminals operate, the tools they use and the approaches they take to embed robust security within the organization.

Top Security Blog: Key Steps In Managing And Reporting A Cybersecurity Incident

According to Trend Micro, there is a difference between hacking and cybercrime. “Hacking does not necessarily count as a cybercrime; as such, not all hackers are cybercriminals.”

Ransomware and Its Connection to Cybercriminal

“With ransomware going rampant and victim organizations paying up to millions of U.S. dollars to the extortionists, this problem is just going to get worse. The U.S. government recently announced that ransomware is a national cybersecurity challenge and that there will be serious implications for anyone attacking the United States or their critical infrastructure.

This may lead more cybercriminals to shift their attention towards the emerging economies like Africa, where we do not have the government’s support or capacities to stop and prosecute cybercriminals, making it a safer place to operate,” says Collard.

Social engineering or people hacking is a popular way to distribute ransomware – predominately by tricking people into falling for their phishing scams.

Top News: Kingston Digital Ships DC1500M Data Center U.2 NVMe SSD

Related Posts
1 of 40,849

“Another technique to be aware of is password spraying,” she explains. “This is when the bad actor selects a common password, like the organization’s name, followed by the year, and tries it against every user in the organization. They scrape names of employees from LinkedIn and then using this information, try the possible password against the list of names. Then it keeps on cycling until it hits a winning entry. This is a solid case for ensuring that every single employee uses proper passwords or a password manager and multi-factor authentication where possible.

“This level of attack really underscores how important it is to undertake consistent employee training and security skills development,” says Collard. “No matter how secure your perimeter, no matter how much money is spent on high-end security systems, one poor password can open the doors to the threat actors.”

Multi-factor authentication and robust training are not just invaluable for employees in the office, they are even more critical today as people w************* and multiple locations – particularly as employees migrate to coffee shops for power and Wi-Fi during load-shedding. Public Wi-Fi is wide open and home networks with poor passwords or out-of-date software are open doors.

“It is also really important to make sure that employees use a VPN, although that is also not a guaranteed protection” says Collard as a recent report by the Orange Cyber Defense team explained. “With home routers being vulnerable due to people not configuring them correctly or updating them, it might be worthwhile sending pre-configured routers and firewalls to employees’ homes, especially for those who access highly confidential information.”

Another challenge for the organization is keeping up with vulnerabilities and patch management, which is a complicated task in bigger environments.

“Leading hackers and experts like Kevin Mitnick are drawing lines under the importance of putting people’s understanding of these threats at the forefront,” says Collard.

Ann added, “Make sure that passwords are secure, that they are not stored in diaries or on open platforms like Slack or Google Hangouts, that they understand how to identify social engineering attacks and keep security hygiene at the forefront of all communication. People need to know what is out there, and that they have the skills to play an important role in protecting themselves and the organization.”

Top News: Scaling up Active Surveillance for COVID-19 Necessary to Contain Its Spread

Today, the threat actors are organized and well paid. They benefit immensely from their pursuit of vulnerabilities, simple mistakes and human error. Organizations have to sit on the sharp end of the security stick with robust monitoring and detection systems, clear policies, consistent training and security boundaries.

Source: APO Group / KnowBe4 Africa

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.