Charles Leaver – If You Deploy Continuous Endpoint Monitoring You Can Protect Your Organization From Russian Hackers That Stole A Massive Amount Of Data

Charles Leaver Ziften CEO


It is thought that the biggest recognized cyber attack in the history of data breaches has actually been found by an American cyber security business. It is thought by the company that a team of cyber wrongdoers from Russia that they have actually been examining for numerous months is accountable for stealing passwords in the billions and other delicate personal data. It is declared that the Russian group took 4.5 billion credentials, although a lot were duplicated, and the final outcome was 1.2 billion unique data profiles being stolen. The group took the info from 420,000 websites of varying sizes, from large brand name sites to smaller sized mom and pop shops.

The New York Times stated that the cyber criminals consisted of about 12 individuals. Starting with small scale spamming approaches in 2011 they acquired the majority of the data by purchasing stolen databases.

In an interview with PCMag, the creator of the business that found the breach, Alex Holden, stated “the gang begun by simply purchasing the databases that were available online.” The group used to purchase at fire sales and were described as “bottom feeders”. As time went by they started the purchase of higher quality databases. It’s sort of like graduating from taking bikes to stealing costly cars.”

A Progression From Spamming To Using Botnets


The cyber criminal group began to change their habits. Botnets were employed by the team to collect the stolen data on a much larger scale. Through using the botnets the group had the ability to automate the process of determining websites that were vulnerable and this enabled them to work 24/7. Anytime that a contaminated user would go to a website, the bot would check to see if the vulnerability would be subject to an SQL injection automatically. Utilizing these injections, which is a typically utilized hacking tool, the database of the site would be forced to display its contents through the entering of a basic query. The botnets would flag those websites that were susceptible and the hackers returned later to extract the information from the website. Using the bot was the supreme failure of the group as they were found by the security company utilizing it.

It is believed by the security business that the billions of pieces of information that were taken were not taken at the same time, and that the majority of the records were most likely purchased from other cyber wrongdoers. According to the Times, very few of the records that were taken have actually been offered online, instead the hacking team have decided to utilize the info for the sending of spam messages on social networks for other groups so that they can generate income. Different cyber security specialists are asserting that the magnitude of this breach signifies a trend of cyber lawbreakers stockpiling big quantities of individual profiles over time and saving them for usage later on, according to the Wall Street Journal.

Security expert at the research study firm Gartner, Avivah Litan, stated “companies that depend on user names and passwords have to establish a sense of urgency about changing this.” “Up until they do, lawbreakers will simply keep stockpiling individuals’s credentials.”

Cyber attacks and breaches on this scale underline the need for companies to safeguard themselves with the latest cyber security defenses. Systems that use endpoint threat detection and response will assist organizations to develop a clearer picture of the hazards facing their networks and receive info that is actionable on how best to prevent attacks. Today, when substantial data breaches are going to take place increasingly more, the use of continuous endpoint visibility is crucial for the security of an organization. If the network of the company is constantly monitored, threats can be recognized in real time, and this will reduce the damage that a data breach can cause on the reputation and bottom line of a company.

Leave a Reply

Your email address will not be published. Required fields are marked *