New-Age Hackers Are Ditching Smash-and-Grab TechniquesNew-Age Hackers Are Ditching Smash-and-Grab Techniques

Cyber attacks are taking a new form, with hackers going into a network and exploring for extended periods of time.

Rob Spiegel

April 1, 2016

3 Min Read
Design News logo in a gray background | Design News

As companies move more and more of their assets and communications into the cloud, the issue of security keeps coming up. Cloud companies insist their services are secure, noting that their expertise in cyber security can’t be matched by their customers’ in-house servers. Skeptics argue that the cloud is more vulnerable simply because of its broad surface for potential attack. You can see the cloud public position, while you may not be aware of an in-house server.

Cloud security company Alert Logic recently commissioned a study by Forrester Consulting that revealed that IT professionals cite the lack of visibility into their network and aging firewall systems as the top two factors in cyber security vulnerabilities. Thirty-seven percent of respondents estimate that their firm’s sensitive data had been breached in the past 12 months.

This map shows the sources of cyber attacks in recent history. Perhaps the most surprising aspect of the map is the large percentage of attacks coming from within the US.
(Source: Alert Logic)

Through its work with Forrester and its own annual analytical reports on cloud vulnerabilities, Alert Logic has tracked growing cloud vulnerabilities. “We continue to see an increase in attack frequency for organizations with infrastructure in the cloud. This is not surprising, since production workloads, applications, and valuable data are shifting to cloud environments, and thus so are attacks,” Rahul Bakshi senior director of product at Alert Logic, told Design News.

Meet the New Hacker

The nature of cyber attacks has changed. In the past, major threats came from recreational hackers and disgruntled former employees. Now there is an underclass of hackers who intrude for profit, seeking personal information and trade secrets. “Today’s attackers are a sophisticated lot, using advanced techniques to infiltrate a business environment,” said Bakshi. “Unlike in the past when hackers primarily worked alone using smash-grab techniques, today’s attackers work in groups, each member bringing his or her own expertise to the team.”

READ MORE ABOUT CYBER SECURITY AND HACKERS:

Cyber attacks are now different in nature. Instead of the quick in-and-out, hackers will enter a network and set up shop. “Once they get a foothold, you can see the damage for months. Once they intrude a server or on a network, they start looking around carefully and cautiously, exploring the things they are looking for,” said Bakshi.

Once hackers get into a network, they may sit quietly until they see sufficient reason to begin taking data or doing damage. Security’s goal is to find the hacker before the theft occurs and the damage is done. “Post compromise, they spread and explore. You have to look at the chains, what Lockheed Martin calls the cyber kills chain,” said Bakshi. “Detecting the attack and ascertaining what is going on.”

Rob Spiegel has covered automation and control for 15 years, 12 of them for Design News. Other topics he has covered include supply chain technology, alternative energy, and cyber security. For 10 years he was owner and publisher of the food magazine Chile Pepper.

About the Author

Rob Spiegel

Rob Spiegel serves as a senior editor for Design News. He started with Design News in 2002 as a freelancer covering sustainability issues, including the transistion in electronic components to RoHS compliance. Rob was hired by Design News as senior editor in 2011 to cover automation, manufacturing, 3D printing, robotics, AI, and more.

Prior to his work with Design News, Rob worked as a senior editor for Electronic News and Ecommerce Business. He served as contributing editolr to Automation World for eight years, and he has contributed to Supply Chain Management Review, Logistics Management, Ecommerce Times, and many other trade publications. He is the author of six books on small business and internet commerce, inclluding Net Strategy: Charting the Digital Course for Your Company's Growth.

He has been published in magazines that range from Rolling Stone to True Confessions.

Rob has won a number of awards for his technolloghy coverage, including a Maggy Award for a Design News article on the Jeep Cherokee hacking, and a Launch Team award for Ecommerce Business. Rob has also won awards for his leadership postions in the American Marketing Association and SouthWest Writers.

Before covering technology, Rob spent 10 years as publisher and owner of Chile Pepper Magazine, a national consumer food publication. He has published hundreds of poems and scores of short stories in national publications.

Sign up for Design News newsletters

You May Also Like