TechCentralTechCentral
    Facebook Twitter YouTube LinkedIn
    Facebook Twitter LinkedIn YouTube
    TechCentralTechCentral
    NEWSLETTER
    • News

      Tencent reports first-ever sales decline

      17 August 2022

      Eskom to impose more load shedding

      17 August 2022

      Tiger Brands to go solar – to start with four manufacturing plants

      17 August 2022

      Google buys into African e-logistics firm Lori Systems

      17 August 2022

      A new normal is dividing the global chip industry

      17 August 2022
    • World

      Chip makers are flashing a big warning for the global economy

      17 August 2022

      Semiconductor boom turns to bust

      16 August 2022

      Tencent plans to offload R400-billion Meituan stake: sources

      16 August 2022

      Ether leaps higher on verge of Merge

      16 August 2022

      Institutions eye crypto but retail investors remain nervous

      15 August 2022
    • In-depth

      African unicorn Flutterwave battles fires on multiple fronts

      11 August 2022

      The length of Earth’s days has been increasing – and no one knows why

      7 August 2022

      As Facebook fades, the Mad Men of advertising stage a comeback

      2 August 2022

      Crypto breaks the rules. That’s the point

      27 July 2022

      E-mail scams are getting chillingly personal

      17 July 2022
    • Podcasts

      Qush on infosec: why prevention is always better than cure

      11 August 2022

      e4’s Adri Führi on encouraging more women into tech careers

      10 August 2022

      How South Africa can woo more women into tech

      4 August 2022

      Book and check-in via WhatsApp? FlySafair is on it

      28 July 2022

      Interview: Why Dell’s next-gen PowerEdge servers change the game

      28 July 2022
    • Opinion

      No reason South Africa should have a shortage of electricity: Ramaphosa

      11 July 2022

      Ntshavheni’s bias against the private sector

      8 July 2022

      South Africa can no longer rely on Eskom alone

      4 July 2022

      Has South Africa’s advertising industry lost its way?

      21 June 2022

      Rob Lith: What Icasa’s spectrum auction means for SA companies

      13 June 2022
    • Company Hubs
      • 1-grid
      • Africa Data Centres
      • Altron Document Solutions
      • Amplitude
      • Atvance Intellect
      • Axiz
      • BOATech
      • CallMiner
      • Digital Generation
      • E4
      • ESET
      • Euphoria Telecom
      • IBM
      • Kyocera Document Solutions
      • Microsoft
      • Nutanix
      • One Trust
      • Pinnacle
      • Skybox Security
      • SkyWire
      • Tarsus on Demand
      • Videri Digital
      • Zendesk
    • Sections
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Motoring and transport
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Advertise
    TechCentralTechCentral
    Home»Opinion»Ihab Moawad»Data kidnapping the latest cyber threat

    Data kidnapping the latest cyber threat

    Ihab Moawad By Ihab Moawad20 August 2015
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    Ihab-Moawad-180In April, Trend Micro released a research paper about sextortion, the means through which cybercriminals obtain compromising personal images or videos of Internet users, which they then hold hostage until their demands have been met. Fast-forward to July and we have seen the hack of controversial adultery/dating site Ashley Madison, in which cybercriminals wreaked havoc as they threatened to slowly leak the data of the adulterers using the site, until it and its companion site, Established Men, were shut down.

    An article in Time calls this tactic “Hacking 2.0” — this new hacking method is not about the data, but the context. Making money from stolen data, like credit cards, is a lot of work and cybercriminals have latched onto the fact that they have a larger pay cheque to gain from those that stand to lose more than just money. Hence, a hack like Ashley Madison’s, which could — and has — destroyed reputations and families, is a gold mine for the team responsible for the hack, The Impact Team.

    Moral opinions about Ashley Madison aside, no one appreciates their personal information being kidnapped and held for ransom. But cybercriminals are cunning and they know that if they keep the sums low enough, people that stand to lose more than money would rather pay up. In this case, the Ashley Madison hackers offered users the ultimatum of paying US$19 to have all their information wiped off the site or having it leaked. But there is of course, no guarantee that you can trust a cybercriminal.

    According to Time, there is a new reality that’s making matters worse for corporate security teams. This is that in recent years there has been heavy investment in protecting financial data — spending money to fortify the most valuable data. So, while credit cards may be protected, e-mail servers may have been left in the lurch, but this will slowly change as personal data of different contexts becomes a bargaining chip for cybercriminals.

    Ashley Madison
    Ashley Madison

    Ashley Madison is just one example of an enterprise that has been targeted in this manner. Another example is the malware Cryptolocker, which forced victims to pay a sum to unscramble their data. This racket made $27m in just the first two months from small home owners and businesses. And then there was the Sony hack in December 2014, in which cybercriminals stole corporate e-mails and embarrassed the company. In Hacking 2.0, cybercriminals don’t need to steal your money, all they need is any data that is valuable to you.

    This means that executives should be working tirelessly to do an honest assessment about their enterprise’s valuable data really. Then wise investments need to be made in protecting data that might seem inconsequential if stolen in one context, but a disaster if stolen in another. The bottom line? Every company will now have to plan for ransom and extortion scenarios.

    • Ihab Moawad is regional vice-president at Trend Micro
    Ashley Madison Ihab Moawad Trend Micro
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleSamsung moves to patch phones quicker
    Next Article Telkom challenges iBurst sale

    Related Posts

    No reason South Africa should have a shortage of electricity: Ramaphosa

    11 July 2022

    Ntshavheni’s bias against the private sector

    8 July 2022

    South Africa can no longer rely on Eskom alone

    4 July 2022
    Add A Comment

    Comments are closed.

    Promoted

    Top cybersecurity challenge is inadequate identification of key risks

    17 August 2022

    Acrobat Sign and Microsoft accelerate digital transformation

    17 August 2022

    HPE SimpliVity: addressing SMBs’ data conundrums

    16 August 2022
    Opinion

    No reason South Africa should have a shortage of electricity: Ramaphosa

    11 July 2022

    Ntshavheni’s bias against the private sector

    8 July 2022

    South Africa can no longer rely on Eskom alone

    4 July 2022

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2022 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.