Select Page

Inside man - or be in the soup

Inside man - or be in the soup

I mean, don't be in the soup, eat it. However, what should not be the internal person of the ISPs who help the organizations attacking the system. According to a joint global research by Kaspersky Lab and B2B International, 28% of all cyber attacks and 38% of targeted attacks are the result of malicious activity by internal people. Rough what?

 Inside man - or be in the soup

According to Kaspersky Lab researchers, attackers can reach or trap telecommunications employees in the following ways:

They use public or stolen data sources to look for compromising information about employees. They then blackmail the targeted individuals by forcing them to provide their company IDs, gather information about internal systems, or launch phishing attacks within the company.

Insiders are recruited with the help of underworld forums or "black headhunters". These employees are paid for their services and may be asked to select employees to blackmail.

Internet blackmail is becoming increasingly popular following online data thefts such as data leaks, as they give attackers the means to intimidate or expose various individuals. Data leakage extortion is so common today that the FBI issued a public interest statement on June 1 warning consumers of the risks and possible consequences.

The most sought after inner people

According to Kaspersky Lab researchers, if a mobile operator is attacked, criminals will look for employees who can provide quick access to user and company data as well as illegal SIM card duplication. However, if an ISP is the target, attackers will find those who can map the network and are able to launch built-in attacks.

Although internal attacks can take any form, Kaspersky Lab researchers cite two atypical examples: in one case, a telecommunications employee leaked the phone calls of 70 million prison inmates, thereby repeatedly violating confidentiality; in another case, an SMS center engineer advertised his services on a popular DarkNet forum, meaning that he could intercept messages containing one-time passwords for a two-step login process for customer profiles. 

About the Author

s3nki

Owner of the HOC.hu website. He is the author of hundreds of articles and thousands of news. In addition to various online interfaces, he has written for Chip Magazine and also for the PC Guru. For a time, he ran his own PC shop, working for years as a store manager, service manager, system administrator in addition to journalism.