Cybercriminals Select Insiders To Attack Telecom Providers (helpnetsecurity.com) 24
An anonymous reader quotes a report from Help Net Security:
Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to Kaspersky Lab. In addition, these criminals are also recruiting disillusioned employees through underground channels and blackmailing staff using compromising information gathered from open sources...
According to Kaspersky Lab researchers, if an attack on a cellular service provider is planned, criminals will seek out employees who can provide fast track access to subscriber and company data or SIM card duplication/illegal reissuing. If the target is an Internet service provider, the attackers will try to identify the employees who can enable network mapping and man-in-the-middle attacks.
According to Kaspersky Lab researchers, if an attack on a cellular service provider is planned, criminals will seek out employees who can provide fast track access to subscriber and company data or SIM card duplication/illegal reissuing. If the target is an Internet service provider, the attackers will try to identify the employees who can enable network mapping and man-in-the-middle attacks.
Not surprising (Score:1)
This is not surprising given the industry's constant attack on employee satisfaction. Offshoring, outsourcing, cutting hours and benefits, crappy working conditions. Inside-out security begins with not screwing people over. The companies have shit in their own bed.
Our employees ... (Score:2)
Social engineering - the next new tech frontier? (Score:2)
Yes, I know that what we now call 'social engineering' has been around for as long as humans existed, and probably longer. But when I say "new tech frontier", I mean the marriage of the scientific method, technological processes, and technologically-gathered data, with more scientifically-rigorous studies and experiments in sociology, psychology, neurology, and biology.
Criminals are now systematically, and probably even experimentally, exploiting employees' psychological and social traits in combination wit
OutSourcing IT (Score:1)
I can see the CEO and exec's disclaimers now, "Hey it wasn't our fault, We had nothing to do with it!" while pointing fingers
It's silly to think that... (Score:2)
This is the
Re: (Score:3)
Throughout the later 1990s I gave talks about software security and predicted exactly this. The vast majority of "hackers" (i.e. attackers) in those days were just doing it for fun, to prove themselves, to impress their friends, or whatever. I always ended my talks by warning the audience that this "Garden of Eden" period wouldn't last. Given the large numbers of serious, dedicated criminals out there - not to mention terrorists and national aggressors - it would only be a matter of time before the techniqu
Re: (Score:2)
+1
Thanks to H1Bs (Score:3)
It won't even cost that much to bribe an insider.
A native worker is expensive, but an offshore type who is brought in to replace the expensive folks. . . . not so much.
Start offering the folks who make $20 / day $50,000 and watch how fast your networks fall.
Total rot (Score:2)
Piffle. Sounds like the something from a Frederick Forsythe/John Le Carré cold-war novel.
Too much work (Score:1)
Insert free advert for Kaspersky Lab (Score:2)