martes, 27 septiembre 2022
Visitas totales a la web: 87906384

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

Twitter breach exposes one of tech’s biggest threats: Its own employees

Kevin Collier and Jason Abbruzzese

Cybersecurity professionals broadly agree on a central problem: Computers and code are fixable, but humans are not.

Twitter provided perhaps the highest-profile example of this challenge when its security was breached Wednesday, allowing for scam-filled messages to be sent from some of the most followed people on the platform, including Joe Biden, Barack Obama, Jeff Bezos, Kanye West and Elon Musk.

Specifics of how the attack happened are still unconfirmed, but Twitter announced Wednesday night that it suspected «a coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools.»

Put more simply, Twitter didn’t break. An employee did. Or more than one.

«Humans and their behaviour continue to be the biggest threat for organizations,» said Mikko Hyppönen, the chief research officer at the Finnish cybersecurity company F-Secure.

«Security holes come and go. Sometimes there’s something urgent happening but once you patch and update, you’re good to go,» he said by text message. «The human weaknesses are there always. Every day. Forever.»

Twitter worked to contain the damage, but it took several hours, including a period in which it prevented most verified users from posting new tweets. (Verified users, known for their check marks, tend to be prominent figures in politics, the media, business and culture.) During that time, scam tweets were sent from dozens of major accounts, as well as hundreds of unverified accounts. The hackers quickly received hundreds of transfers worth over $115,000.

Giovanna Falbo, a spokesperson for Twitter, declined to comment beyond the company’s tweets. But the company indicated to Vice’s Motherboard, a tech-focused publication, that whoever was behind the breach had gotten someone inside Twitter to provide the access willingly. Motherboard reported that people who claimed responsibility for the attack had worked with someone at Twitter and that one person said the Twitter employee was paid for the access.

It’s more common for employees to be unaware of the roles they play in data breaches. The most common hacking efforts center on tricking employees into giving up login information, a process known as phishing.

But other major hacks have involved company insiders’ using their access. An «insider threat» was alleged to have been responsible for the 2019 Capital One security breach, in which former Amazon engineer Paige Thompson was accused of leveraging her knowledge of the platform to gain access to Capital One servers on Amazon Web Services.

The problem of company insiders’ opening the door to hackers has also become a national security issue at the heart of international espionage schemes. Twitter has also faced this problem. In November, the Justice Department charged two former Twitter employees with providing user data to Saudi Arabia. And in 2017, a Twitter employee briefly shut down President Donald Trump’s account.

How to stop these kinds of security breaches has become the subject of growing efforts within the cybersecurity world. Which employees have access to what systems is closely watched, and security software can look out for employees who are doing things out of the ordinary.

Companies are also working to figure out how to make sure employees don’t have more access than they need. Marcin Kleczynski, CEO of Malwarebytes, said Twitter will inevitably review the internal systems used in the breaches, pointing in particular to a tool for resetting account passwords that has been the focus of speculation by some cybersecurity experts.

«Twitter will be eager to make sure this never happens again, so it’ll be interesting to see what focus they put on this admin tool and what access folks at Twitter will have going forward,» he said.

Targeting people who may be willing to turn on their employers isn’t a new tactic. For decades, the U.S. defense industry has been the target of widespread espionage efforts to steal sensitive information about weapons systems by pressuring company employees, often with lures of money or threats to reveal sensitive personal information.

While there are no signs that Twitter’s breach was part of an espionage effort — such work usually doesn’t try to attract international attention — other factors can push people to accept monetary offers.

Michael Hamilton, the former chief information security officer for the city of Seattle, said that during the recession that followed the financial crisis, employees were more likely to entertain offers from hackers.

«When the macroeconomics get to be real bad … people have a higher tendency to go to the dark side,» he said.

Hamilton said the current economic downturn has almost certainly triggered more activity from hackers looking for opportunities to persuade employees to take risks.

«The offers for people are probably coming with intensity right now, because the audience is receptive, and again this whole COVID-caused dropout of the economy creates the opportunity for this kind of insider malfeasance,» he said.

Fecha de publicaciónjulio 16, 2020

BELT.ES no se hace responsable de las opiniones de los artículos reproducidos en nuestra Revista de Prensa, ni hace necesariamente suyas las opiniones y criterios expresados. La difusión de la información reproducida se realiza sin fines comerciales. 

Listado de Expertos

Recomendado

Profesión militar: Obediencia debida frente a la obligación de disentir

Con ocasión de la realización de estudios en el Instituto Universitario Gutiérrez Mellado tuve la ocasión de leer y analizar una serie de documentos de opinión que trataban en profundidad las diferentes facetas presentes en el campo de las relaciones cívico-militares; temas que , habitualmente, no han estado presentes en los diferentes cursos y actividades formativas en la enseñanza militar, ni, por supuesto, en la civil.

El amor de Macarena Olona por la Guardia Civil empieza por su pareja, un joven oficial condecorado

El padre de su hijo llegó a la Benemérita como militar de carrera y, los que le...

La artillería ‘made in USA’ comprada por Marruecos que deja fuera de juego a España

El país magrebí sigue reforzando sus fuerzas armadas a golpe de talonario, y no lo hace de...

Últimas noticias

Pilar Montero del grupo de emergencias en Patrimonio (UCM): «El terremoto de Lorca lo cambió todo»

La directora del grupo de investigación de Gestión de Riesgos y Emergencias en Patrimonio Cultural (GREPAC)...

La actriz de Hollywood que logró uno de los inventos militares más importantes del siglo XX

Hedy Lamarr pasó de huir del fascismo que se propagaba por Europa en los años treinta a enfrentarse directamente a él, creando...

SEGURIDAD, “GLOBAL BRITAIN” Y ENTIERRO DE LA REINA ISABEL II DEL REINO UNIDO

El 19 de septiembre de 2022, ha sido un día que pasará a la historia del Reino Unido y la del resto del mundo. En ese día se ha producido el entierro de la reina Isabel II de Inglaterra tras su fallecimiento el día 8 de septiembre en el castillo de Balmoral (Escocia).

El pulso electromagnético, el arma que puede hacer retroceder a una ciudad al siglo XIX

Estados Unidos, Rusia y China trabajan en sus propios proyectos. El Pentágono cree que Irán y Corea del Norte también lo hacen.

Así se gestó un ‘atraco virtual’ de 240.000 euros a través de Bizum

Más de un centenar de personas participó en un entramado para desvalijar la cuenta corriente de una anciana tras detectar una debilidad...