Massive cyber-attack: what businesses can learn from major data breaches

Probing hackers are becoming an increasing danger
Probing hackers are becoming an increasing danger

The cyber-attack on Sony Picture's infrastructure last November brought into sharp relief the fact that everyone can fall victim to such attacks and they are not going to go away.

Such was the scale of the attack, Sony is still picking up the pieces and many of its systems remain offline as security professionals seek to repair the damage caused by the affair. The hack led to embarrassing emails being released as well as a number of movies leaked to file-sharing sites. The finger of blame initially pointed to North Korea, said to be furious over the portrayal of its leader Kim Jung Un in the movie The Interview. Hard drives had also been wiped and its network was out of commission for more than a week.

In the light of this and other breaches over the past twelve months, how can we protect our infrastructure from such transgressions?

Entry point

Although no one seems to have publicly stated how the Sony attack happened, according to Barry Scott, Chief Technology Officer EMEA at Centrify, attackers initially look for a way into networks.

"Often through a phishing attack installing malware on an unsuspecting user's machine, and after gaining access they expect to have to jump from one system to another, increasing knowledge of the network as they go, until they hit gold," he says. "The goal is to find administrative credentials – without admin rights they are limited as to what they can do."

Enterprise internal network communications visibility and understanding of behaviour is an often overlooked element of information security, especially when organisations have significantly invested in modern border defences.

But in an era when even printers can be compromised and used as a pivot point to attack other systems, internal insight into what is genuinely happening is vital, according to David Palmer, Director of Technology at Darktrace.

"The complexity of large organisations can be managed by using machine learning and abnormality detection to direct the attention of defenders onto the incidents that most need investigating," he says.

GFI Software's General Manager, Sergio Galindo, says that organisations need to be aware of what is going on inside their own office and network. "By looking at network traffic – not only during office hours, but outside of office hours too – businesses can identify unusual traffic patterns that potentially give up a hacker," he says.

"What we saw with the likes of Sony and JP Morgan was that hackers were able to sit on the network for months, steadily gathering and transferring large quantities of information out of the organisation without anyone noticing," he adds.

Latest in Security
China
Notorious Chinese hackers FamousSparrow allegedly target US financial firms
A digital representation of a lock
NYU website defaced as hacker leaks info on a million students
NHS
NHS IT supplier hit with major fine following ransomware attack
Businessman holding a magnifier and searching for a hacker within a business team.
Cloud streaming hoster StreamElements confirms data breach following attack
A digital representation of blockchain.
Malicious npm packages use devious backdoors to target users
Data leak
Top home hardware firm data leak could see millions of customers affected
Latest in News
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does
Nintendo Virtual Game Card
Nintendo reveals the new Virtual Game Card feature, an easier way to manage your digital Switch games
Nintendo Switch 2
The Nintendo Switch 2 pre-order date has seemingly been confirmed by Best Buy Canada – here's when you'll be able to order yours
Person printing
Microsoft’s latest Windows 11 update exorcises possessed printers that spewed out pages of random characters