IT disaster recovery, cloud computing and information security news

The anatomy of a malicious insider: how cyber criminals recruit insiders to attack telecoms providers

Cyber criminals are using insiders to gain access to telecommunications networks and subscriber data, recruiting disaffected employees through underground channels or blackmailing staff using compromising information gathered from open sources, according to a Kaspersky Lab intelligence report into security threats facing the telecommunications industry.

Telecommunications providers are a top target for cyber attacks. They operate and manage the world’s networks, voice and data transmissions, and store vast amounts of sensitive data. This makes them highly attractive to cyber criminals in search of financial gain, as well as nation-state sponsored actors launching targeted attacks, and even competitors.

To achieve their goals, cyber criminals often use insiders as part of their malicious ‘toolset’, to help them breach the perimeter of a telecommunications company and perpetrate their crimes. New research by Kaspersky Lab and B2B International reveals that 28 percent of all cyber attacks, and 38 percent of targeted attacks now involve malicious activity by insiders. The intelligence report examines popular ways of involving insiders in telecoms-related criminal schemes and gives examples of the things insiders are used for.  

Compromising employees

According to the Kaspersky Lab researchers, attackers engage or entrap telecoms employees in the following ways:

  • Using publicly available or previously stolen data sources to find compromising information on employees of the company they want to hack. They then blackmail targeted individuals, forcing them to hand over their corporate credentials, provide information on internal systems or distribute spear-phishing attacks on their behalf.
  • Recruiting willing insiders through underground message boards or through the services of ‘black recruiters’.  These insiders are paid for their services and can also be asked to identify co-workers who could be engaged through blackmail.

The blackmailing approach has grown in popularity following online data breaches such as the Ashley Madison leak, as these provide attackers with material they can use to threaten or embarrass individuals. In fact, data leak related extortion has now become so widespread that the FBI issued a Public Service Announcement on 1 June warning consumers of the risk and its potential impact.

According to the Kaspersky Lab researchers, if an attack on a cellular service provider is planned, criminals will seek out employees who can provide fast track access to subscriber and company data or SIM card duplication/illegal reissuing. If the target is an Internet service provider, the attackers will try to identify those who can enable network mapping and man-in-the-middle attacks. However, insider threats can take all forms.

In order to protect the organization from insider threat, Kaspersky Lab advises the following:

  • Educate your staff about responsible cybersecurity behaviour / behaviour and the dangers to look out for, and introduce robust policies about the use of corporate email addresses;
  • Use Threat Intelligence Services to understand why cybercriminals might be looking at your company and to find out if someone is offering an insider ‘service’ in your organization;
  • Restrict access to the most sensitive information and systems;
  • Do a regular security audit of the company’s IT infrastructure.

www.kaspersky.co.uk



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.