News
Cyberattacks based on the victim´s compliance
Information security compliance has become now a new exploit that cybercriminals are taking advantage from, prompting a need for clear regulatory guidance and proactive security measures.
1. Corporate compliance as a new cyberattack strategy
The evolution of cybercrime is not only based on the development of technologies used by cybercriminals. Recent events show that cybercriminals are also incorporating, as an innovative element in their criminal strategies, certain analysis of the legal obligations of companies.
For example, the gang known as ransomed have begun to use, as a complementary threat to the traditional extortion derived from the ransomware attacks they usually carry out, that of the sanctions contemplated by the regulations applicable to those cases in which the breach of the obligations of diligence required from companies during the management of security incidents is proven. We are referring to the current General Data Protection Regulation, whose penalties for breaching security obligations can reach millions of dollars.
2. Cases of compliance-based cyberattacks
This is what happened with the extortion of the company Meridianlink, which, after the last cyberattack caused by Ransomed, was reported to the US SEC for not having properly notified the incident, thus failing to comply with the applicable regulations. Such thing could imply, for the affected company, a penalty of an amount significantly higher than the amounts demanded by the cyberattackers for not reporting the incident.
In this case, the mechanics followed by the criminals consist of causing a security incident, as it has always been done, but the difference lies in the strategy used. Which means that the payment they request from their victims is calculated based on the eventual sanction that would be applied to the affected company for not having implemented the appropriate security measures and not having notified the incident, being obliged to do so. Indeed, in these cases, the cybercriminals themselves who caused the security breach report the affected company to the supervisory authority, providing evidence of the reality of the incident in question (who else if not the person responsible of the crime to prove that the incident has occurred and is real) and of the failure of the affected company to comply with the applicable regulations if the incident has not been reported to the authorities in a timely manner to the authorities.
In this way, the chance of the company considering the payment of the requested amounts increases significantly, instead of risking being sanctioned to pay the fines imposed by the regulator, especially in view of the complaint and evidence that the cybercriminals responsible for the incident may have provided. To this scenario can be added the possible reputational crisis that, for the company, such action would cause.
3. Balancing compliance and resilience: clarifying company responses to Cybersegurity Incidents
That is why it seems advisable to develop a doctrine that clarifies to companies what the position of the control authorities will be when analysing possible complaints received from the organised gangs of criminals causing the cybersecurity incident, which they report and easily prove with evidence.It is true that companies must comply with the security and transparency obligations required of them by the applicable regulations. However, other mitigating factors must also be considered, such as the fact that the company refuses to submit to extortion, almost certainly facing a sanctioning procedure, but showing some diligence in its reactive management of the incident.
Article provided by INPLP members: Francisco Perez Bes and Esmeralda Saracibar (ECIX Group, Spain)
Discover more about the INPLP and the INPLP-Members
Dr. Tobias Höllwarth (Managing Director INPLP)
News Archiv
- Alle zeigen
- November 2024
- Oktober 2024
- September 2024
- August 2024
- Juli 2024
- Juni 2024
- Mai 2024
- April 2024
- März 2024
- Februar 2024
- Jänner 2024
- Dezember 2023
- November 2023
- Oktober 2023
- September 2023
- August 2023
- Juli 2023
- Juni 2023
- Mai 2023
- April 2023
- März 2023
- Februar 2023
- Jänner 2023
- Dezember 2022
- November 2022
- Oktober 2022
- September 2022
- August 2022
- Juli 2022
- Mai 2022
- April 2022
- März 2022
- Februar 2022
- November 2021
- September 2021
- Juli 2021
- Mai 2021
- April 2021
- Dezember 2020
- November 2020
- Oktober 2020
- Juni 2020
- März 2020
- Dezember 2019
- Oktober 2019
- September 2019
- August 2019
- Juli 2019
- Juni 2019
- Mai 2019
- April 2019
- März 2019
- Februar 2019
- Jänner 2019
- Dezember 2018
- November 2018
- Oktober 2018
- September 2018
- August 2018
- Juli 2018
- Juni 2018
- Mai 2018
- April 2018
- März 2018
- Februar 2018
- Dezember 2017
- November 2017
- Oktober 2017
- September 2017
- August 2017
- Juli 2017
- Juni 2017
- Mai 2017
- April 2017
- März 2017
- Februar 2017
- November 2016
- Oktober 2016
- September 2016
- Juli 2016
- Juni 2016
- Mai 2016
- April 2016
- März 2016
- Februar 2016
- Jänner 2016
- Dezember 2015
- November 2015
- Oktober 2015
- September 2015
- August 2015
- Juli 2015
- Juni 2015
- Mai 2015
- April 2015
- März 2015
- Februar 2015
- Jänner 2015
- Dezember 2014
- November 2014
- Oktober 2014
- September 2014
- August 2014
- Juli 2014
- Juni 2014
- Mai 2014
- April 2014
- März 2014
- Februar 2014
- Jänner 2014
- Dezember 2013
- November 2013
- Oktober 2013
- September 2013
- August 2013
- Juli 2013
- Juni 2013
- Mai 2013
- April 2013
- März 2013
- Februar 2013
- Jänner 2013
- Dezember 2012
- November 2012
- Oktober 2012
- September 2012
- August 2012
- Juli 2012
- Juni 2012
- Mai 2012
- April 2012
- März 2012
- Februar 2012
- Jänner 2012
- Dezember 2011
- November 2011
- Oktober 2011
- September 2011
- Juli 2011
- Juni 2011
- Mai 2011
- April 2011
- März 2011
- Februar 2011
- Jänner 2011
- November 2010
- Oktober 2010
- September 2010
- Juli 2010