Security

2014 Hack Retrospective, Or Why Security Ecosystems Matter

Comment

Image Credits: Benoit Daoust (opens in a new window) / Shutterstock (opens in a new window)

Laurent Gil

Contributor

Editor’s note: Laurent Gil co-founded Zenedge after witnessing a major DDoS attack where cyber-terrorists took down a colleague’s company network for several days, costing the organization $1.2 million in revenue.  

The “Year of the Hack” will probably be one way that 2014 will be remembered. But it actually began in 2013 with a phishing email sent to independent, mid-sized air conditioning vendor Fazio Mechanical.

2014 hacks kicked into high gear with the resignation of the CEO at one of the nation’s largest and most recognizable retailers — Target. It then steadily progressed to see similar attacks on other major retailers like Neiman Marcus and Home Depot, and even financial institutions like Chase and J.P. Morgan. It finally exploded in November with a monstrous cyber assault against a major entertainment brand, Sony, drawing concern by the private-sector and the ire of our own government.

There are clues to how hacks that began in 2013 (some even earlier) continue to reverberate, even as we begin a New Year.

Target’s massive data breach illustrated that no matter how secure the internal cybersecurity of a major organization may seem, malicious attacks can come from anywhere, even from the smallest, most innocent-looking partner.

We all know the stats: The 2013 Target breach cost the company 475 employees at its Minneapolis headquarters (1,175 if you count the 700 unfulfilled positions); $200 million, minus $38 million, of a $90 million insurance policy; 40 million compromised credit and debit accounts and the personal data theft of 70 million consumers. Untold damages to the public trust piled up. The CEO resigned, a CIO was introduced, and more than 140 lawsuits were brought against the company.

For 19 days in 2013, the names, card numbers, expiration dates and security codes of 110 million Target shoppers were flagrantly stolen, and the retailer has worked all year to contain and repair the damage.

Now multiply those damages across a dozen Targets, Home Depots and Sonys. It paints a grim financial picture.

How Do These Hacks Happen? 

Let’s start with Target: While protections seemed adequate across Target’s internal systems, the critical failure occurred outside, in the larger network ecosystem, which included a small HVAC contractor. Malware wormed its way into the organization’s POS via an email exchange between the two companies, and the rest is history. After injecting a virus into Target’s payment systems, cyber thieves had full access to consumer payment information, stealing at will and ultimately selling the data to underground markets, where thieves are believed to have recreated credit and debit cards to make fraudulent purchases.

This pattern hasn’t changed. Home Depot and Neiman Marcus suffered similar events, with thieves easily infiltrating one sector of the organization, only to gain access to every digital system. The origin of Sony’s hack is thought to be, surprisingly, the same office breached during its 2011 PlayStation hack – meaning a known hole, albeit a small one, was never secured.

Even scarier is that still today, the majority of large companies neglect to view unlikely access points, like small business units or external vendors, as part of their security ecosystem, leaving unguarded a vast number of digital portholes. Think about it: How many tiny, seemingly inconsequential business units make up S&P 100, or Fortune 1000, company networks, all connected via email or cloud services that don’t use strong encryption or malware technology? And how many mom-and-pop vendors do business within these large networks every day?

Each major data breach has offered a teachable moment for all businesses, illustrating that it’s no longer enough to erect an impenetrable wall around a single digital infrastructure to ward off threats. Target in 2013 should have sounded a resounding alarm that the target of a hack doesn’t matter: The National Cyber Security Alliance (NCSA) even issued a report shortly after that one-third of all cyber attacks now go after small- to mid-sized businesses.

A mid-2014 study found that targeted attacks against SMBs nearly doubled in 2013 from the year before, and predicted 2014 would hold more of the same. Scarier still, 80 percent of SMBs still have no web security system in place, only 50 percent deploy basic Internet security practices, and 50 percent do not back up their data.

While many implement basic lines of defense, like firewalls, intrusion prevention systems (IPS), gateways or AV software — this is akin to thinking an umbrella will shield you from a missile launch.

Of course there are challenges to plugging all of the holes across a business ecosystem’s network: Corporate infrastructures, culture and even varying degrees of IT understanding can hinder standardizing security platforms and protocols – both vertically and horizontally across the commerce chain.

And then there’s the biggest hurdle: cost. What is universally agreed upon is that good defense is time-consuming and expensive, although it might look like a bargain when we hear stats like this: The U.S. House Small Business Subcommittee on Health and Technology shows roughly 60 percent of small businesses hit by cybercriminals shutter with six months of an attack. Sony’s underinvestment in security may cost in excess of $100 million, and subject the firm to years of lawsuits from past and current employees over stolen private data. Target will see more than 140 lawsuits head to court in 2015.

The fact remains that hackers are constantly testing for weaknesses and holes, and those holes are often in small units that appear organizationally insignificant, until their connection to the larger network is exploited. As we’ve witnessed all through 2014, once the door of a neglected SMB partner or via a semi-protected internal department is pushed open, it is quite easy to gain broad-network access to the larger organization.

A Shared Responsibility

To combat such massive, organization-wide breaches, security is increasingly looked at by corporate boards and enterprise IT departments as a shared, contractual responsibility between large business, smaller business units, and even the external vendor network. It works something like this:

Enterprises are essentially taking a page from the history books and designing security systems reminiscent of medieval fortresses. Imagine a defensive wall around the village that surrounds a castle — with hackers confronted first with fortified external systems, and therefore unable to penetrate even that 10-employee vendor to gain back-door entry into their larger target.

What is created is a system of autonomous and independent, yet interconnected, defensive barriers around individual business units (like subsidiaries, sub-firms, branches, divisions and departments) that make it necessary for thieves to scale multiple walls. Even if one wall is compromised they are confronted with another, and another, and another wall.

And while security protocols are managed and “owned” independently, they are also continuously updated and monitored in real time by a centralized system. The idea is that if each unit is autonomously fortified, yet housed within a common administrative “dome,” the likelihood of a one-and-done, organization-wide breach is dramatically reduced.

This approach is being applied internally across organizations, but it may be a while before all small business units and external vendors are also looped into these systems. Ultimately, with external and internal systems acting as autonomous security perimeters, headquarters will be able to monitor each as a standalone system – and someday even coordinate joint dynamic, real-time security protocols across the larger network when thieves start testing for weaknesses.

By building and extending these syndicates of unique-but-cooperative security systems outward, firms will present a more united front against cyber thieves and make attacks the scale of Target’s and Sony’s substantially less likely.

Target started us down this path to the “Year of the Hack,” and still remains a painful reminder of what happens when a network fails to fortify every access point. Its breach illustrates the damage the tiniest fissure can cause, and a lesson that cybersecurity is not a solitary endeavor. Face it, when a hacker sees an opportunity, he or she doesn’t care if the unguarded door has left open by an office of 100,000 or 10. All they see is a Target.

Zenedge infographic

 

More TechCrunch

Tags

Copilot, Microsoft’s brand of generative AI, will soon be far more deeply integrated into the Windows 11 experience.

Microsoft Build 2024: All the AI and hardware products Microsoft announced

Hello and welcome back to TechCrunch Space. For those who haven’t heard, the first crewed launch of Boeing’s Starliner capsule has been pushed back yet again to no earlier than…

TechCrunch Space: Star(side)liner

When I attended Automate in Chicago a few weeks back, multiple people thanked me for TechCrunch’s semi-regular robotics job report. It’s always edifying to get that feedback in person. While…

These 81 robotics companies are hiring

The top vehicle safety regulator in the U.S. has launched a formal probe into an April crash involving the all-electric VinFast VF8 SUV that claimed the lives of a family…

VinFast crash that killed family of four now under federal investigation

When putting a video portal in a public park in the middle of New York City, some inappropriate behavior will likely occur. The Portal, the vision of Lithuanian artist and…

NYC-Dublin real-time video portal reopens with some fixes to prevent inappropriate behavior

Longtime New York-based seed investor, Contour Venture Partners, is making progress on its latest flagship fund after lowering its target. The firm closed on $42 million, raised from 64 backers,…

Contour Venture Partners, an early investor in Datadog and Movable Ink, lowers the target for its fifth fund

Meta’s Oversight Board has now extended its scope to include the company’s newest platform, Instagram Threads, and has begun hearing cases from Threads.

Meta’s Oversight Board takes its first Threads case

The company says it’s refocusing and prioritizing fewer initiatives that will have the biggest impact on customers and add value to the business.

SeekOut, a recruiting startup last valued at $1.2 billion, lays off 30% of its workforce

The U.K.’s self-proclaimed “world-leading” regulations for self-driving cars are now official, after the Automated Vehicles (AV) Act received royal assent — the final rubber stamp any legislation must go through…

UK’s autonomous vehicle legislation becomes law, paving the way for first driverless cars by 2026

ChatGPT, OpenAI’s text-generating AI chatbot, has taken the world by storm. What started as a tool to hyper-charge productivity through writing essays and code with short text prompts has evolved…

ChatGPT: Everything you need to know about the AI-powered chatbot

SoLo Funds CEO Travis Holoway: “Regulators seem driven by press releases when they should be motivated by true consumer protection and empowering equitable solutions.”

Fintech lender SoLo Funds is being sued again by the government over its lending practices

Hard tech startups generate a lot of buzz, but there’s a growing cohort of companies building digital tools squarely focused on making hard tech development faster, more efficient and —…

Rollup wants to be the hardware engineer’s workhorse

TechCrunch Disrupt 2024 is not just about groundbreaking innovations, insightful panels, and visionary speakers — it’s also about listening to YOU, the audience, and what you feel is top of…

Disrupt Audience Choice vote closes Friday

Google says the new SDK would help Google expand on its core mission of connecting the right audience to the right content at the right time.

Google is launching a new Android feature to drive users back into their installed apps

Jolla has taken the official wraps off the first version of its personal server-based AI assistant in the making. The reborn startup is building a privacy-focused AI device — aka…

Jolla debuts privacy-focused AI hardware

OpenAI is removing one of the voices used by ChatGPT after users found that it sounded similar to Scarlett Johansson, the company announced on Monday. The voice, called Sky, is…

OpenAI to remove ChatGPT’s Scarlett Johansson-like voice

The ChatGPT mobile app’s net revenue first jumped 22% on the day of the GPT-4o launch and continued to grow in the following days.

ChatGPT’s mobile app revenue saw its biggest spike yet following GPT-4o launch

Dating app maker Bumble has acquired Geneva, an online platform built around forming real-world groups and clubs. The company said that the deal is designed to help it expand its…

Bumble buys community building app Geneva to expand further into friendships

CyberArk — one of the army of larger security companies founded out of Israel — is acquiring Venafi, a specialist in machine identity, for $1.54 billion. 

CyberArk snaps up Venafi for $1.54B to ramp up in machine-to-machine security

Founder-market fit is one of the most crucial factors in a startup’s success, and operators (someone involved in the day-to-day operations of a startup) turned founders have an almost unfair advantage…

OpenseedVC, which backs operators in Africa and Europe starting their companies, reaches first close of $10M fund

A Singapore High Court has effectively approved Pine Labs’ request to shift its operations to India.

Pine Labs gets Singapore court approval to shift base to India

The AI Safety Institute, a U.K. body that aims to assess and address risks in AI platforms, has said it will open a second location in San Francisco. 

UK opens office in San Francisco to tackle AI risk

Companies are always looking for an edge, and searching for ways to encourage their employees to innovate. One way to do that is by running an internal hackathon around a…

Why companies are turning to internal hackathons

Featured Article

I’m rooting for Melinda French Gates to fix tech’s broken ‘brilliant jerk’ culture

Women in tech still face a shocking level of mistreatment at work. Melinda French Gates is one of the few working to change that.

1 day ago
I’m rooting for Melinda French Gates to fix tech’s  broken ‘brilliant jerk’ culture

Blue Origin has successfully completed its NS-25 mission, resuming crewed flights for the first time in nearly two years. The mission brought six tourist crew members to the edge of…

Blue Origin successfully launches its first crewed mission since 2022

Creative Artists Agency (CAA), one of the top entertainment and sports talent agencies, is hoping to be at the forefront of AI protection services for celebrities in Hollywood. With many…

Hollywood agency CAA aims to help stars manage their own AI likenesses

Expedia says Rathi Murthy and Sreenivas Rachamadugu, respectively its CTO and senior vice president of core services product & engineering, are no longer employed at the travel booking company. In…

Expedia says two execs dismissed after ‘violation of company policy’

Welcome back to TechCrunch’s Week in Review. This week had two major events from OpenAI and Google. OpenAI’s spring update event saw the reveal of its new model, GPT-4o, which…

OpenAI and Google lay out their competing AI visions

When Jeffrey Wang posted to X asking if anyone wanted to go in on an order of fancy-but-affordable office nap pods, he didn’t expect the post to go viral.

With AI startups booming, nap pods and Silicon Valley hustle culture are back

OpenAI’s Superalignment team, responsible for developing ways to govern and steer “superintelligent” AI systems, was promised 20% of the company’s compute resources, according to a person from that team. But…

OpenAI created a team to control ‘superintelligent’ AI — then let it wither, source says