External Threat Management

Executives can be Data-Breached: How Safe is your CEO?

Extortion, blackmail, data leakage, targeted spearphishing.

Your organization's leadership are not only prime targets for cyber attackers but also a principal attack vector themselves. Defending your executive team, both online from cyber attacks and physical attacks requires a new approach: acting and thinking like "the bad guys.”

Cybercriminals constantly try to find and distribute sensitive information about these high-profile, high-net-worth individuals. When they’re familiar with someone’s name, likeness and personal web presence, bad actors can sell information about the super-wealthy, or use it against them in digital attacks. These digital invasions can also translate into disturbing real-world attacks: since 2013, 78,617 firms have been scammed out of more than $12 billion. The bad guys only had to exploit the financial executives at these companies to make it happen. So-called spearphishing and whaling attacks are two ways to do it.

A spearphishing cyber attack is a maneuver that targets employees with sensitive information via email. The threat actor pretends to be an executive, and often fools the employee. This is because the hacker has more information about the CEO than anyone should, and can, therefore, impersonate them convincingly.

This makes it easy to fool employees into sending sensitive information to someone who claims to be legit but is actually a malicious actor. In 2016, a Seagate employee emailed income tax data for several employees to a hacker, exposing thousands of people's personal data to a third party.

Whaling attacks target executives directly and are another successful form of attack. These emails and websites contain information gleaned from a variety of sources. By using information like addresses, titles, family names, and colleagues’ names and titles, these emails can even fool the highest-ranking personnel into giving up company secrets. For the boldest cybercriminals, this information can also be used to target executives for extortion and ransom pay in the real world.

If you want to prevent harm to executives while stopping damaging cyber attacks, you must have a security program that bridges the digital and physical worlds. It should find leaked personal data, track what potential attackers can find, and minimize the likelihood of information falling into the wrong hands.

Internet-scale visibility is crucial to protecting your attack surface.

Just like a website, server, or mobile app, your executives are a key attack vector for hackers. No employee is more central your business operations, nor has access to more sensitive, potentially damaging information. Humans can be data-breached too!

Organizations must combat internet-scale threats with internet-scale visibility. If they have a real-time picture of how their executives appear across the internet, they can understand the massive scope of their cyber attack surface and develop an effective threat management strategy to protect it.

Crossing your fingers for luck is no strategy at all.

Subscribe to Our Newsletter

Subscribe to the RiskIQ newsletter to stay up-to-date on our latest content, headlines, research, events, and more.

Base Editor