Magecart Strikes Again
Ticketmaster, British Airways, and Newegg have all been compromised. Who’s next? Read our research to see how we discovered the breaches.
IDG Connect: 2017 State of Enterprise Digital Defense Report
Findings quantify the security management gap and business impact of external web, social, and mobile threats.
Get the Research Report
Frost & Sullivan: The Digital Threat Management Platform Advantage
The material benefits of a platform-based approach to security outside the firewall.
Read the Report
2018 Holiday Shopping Season Threat Activity: A Snapshot
The 2018 holiday shopping season was the largest ever for online retailers, but threat actors filled their pockets, too.
So what did the threat activity around this shopping frenzy look like?
Rackspace Accelerates External Digital Threat Investigation with RiskIQ PassiveTotal
Download Case Study
EMA Radar™ Q4 2017 Report
RiskIQ ranked a technology and value leader in digital threat intelligence management.
Get the Analyst Report
Extortion, blackmail, data leakage, targeted spearphishing.
Your organization’s leadership are not only prime targets for cyber attackers but also a principal attack vector themselves. Defending your executive team, both online and physically requires a new approach: acting and thinking like “the bad guys.”
Cybercriminals constantly try to find and distribute sensitive information about these high-profile, high-net-worth individuals. When they’re familiar with someone’s name, likeness and personal web presence, bad actors can sell information about the super-wealthy, or use it against them in digital attacks. These digital invasions can also translate into disturbing real-world attacks: since 2013, 78,617 firms have been scammed out of more than $12 billion. The bad guys only had to exploit the financial executives at these companies to make it happen. So-called spearphishing and whaling attacks are two ways to do it.
A spearphishing attack is a maneuver that targets employees with sensitive information via email. The threat actor pretends to be an executive, and often fools the employee. This is because the hacker has more information about the CEO than anyone should, and can, therefore, impersonate them convincingly.
This makes it easy to fool employees into sending sensitive information to someone who claims to be legit but is actually a malicious actor. In 2016, a Seagate employee emailed income tax data for several employees to a hacker, exposing thousands of people’s personal data to a third party.
Whaling attacks target executives directly and are another successful form of attack. These emails and websites contain information gleaned from a variety of sources. By using information like addresses, titles, family names, and colleagues’ names and titles, these emails can even fool the highest-ranking personnel into giving up company secrets. For the boldest cybercriminals, this information can also be used to target executives for extortion and ransom pay in the real world.
If you want to prevent harm to executives while stopping damaging cyber attacks, you must have a security program that bridges the digital and physical worlds. It should find leaked personal data, track what potential attackers can find, and minimize the likelihood of information falling into the wrong hands.
Internet-scale visibility is crucial to protecting your attack surface.
Just like a website, server, or mobile app, your executives are a key attack vector for hackers. No employee is more central your business operations, nor has access to more sensitive, potentially damaging information. Humans can be data-breached too!
Organizations must combat internet-scale threats with internet-scale visibility. If they have a real-time picture of how their executives appear across the internet, they can understand the massive scope of their attack surface and develop an effective threat management strategy to protect it.
Crossing your fingers for luck is no strategy at all.
Meeting the mobile malware threat: Fabian Libeau, EMEA VP at @RiskIQ, looks at the growing threat posed by mobile malware to businesses, their brands and customers, and how it can be tackled. https://t.co/0W1J3M9bfv
Our EMEA VP, @flibeau, looks into the growing threat posed by mobile #malware to businesses, their brands, and customers via @MMMagTweets https://t.co/7gYaaf5UjW
Magecart’s web-based supply chain attacks are taking over the web. Our very own head of threat research, @ydklijnsma, discusses the phenomenon via @cbronline https://t.co/4b8cfIKPoo #Magecart
Web threats are redefining cybercrime. Today, #Magecart isn’t just a security problem; it’s also a business problem https://t.co/yggG0lWsK2
Magecart Group 4 take 2: We took down another 30+ domains which Group 4 setup right after our previous takedown and blog. We will continue our disruption efforts with @abuse_ch & @Shadowserver.
Here is the new set of domains that have been taken offline: https://t.co/CDbJgGqT1g