Sign In

Determined hackers pose a growing risk

Shock­waves from the tsuna­mi of the biggest per­son­al data hack, into Pana­man­ian law firm Mos­sack Fon­se­ca, are still hit­ting politi­cians and celebri­ties world­wide. Believed to have been orches­trat­ed at the behest of the US gov­ern­ment, it is but one of an almost week­ly assault on organ­i­sa­tions’ dig­i­tal data, join­ing the line-up which already includ­ed the likes of Car­phone Ware­house and Ash­ley Madi­son.

But for many busi­ness­es, it is the grow­ing threat that cyber crime pos­es to the secu­ri­ty of not their per­son­al or cus­tomer details, but to their intel­lec­tu­al prop­er­ty or IP.

Protecting intangible assets

Robert Williams, part­ner and co-head of the Lon­don IP group at lawyers Bird & Bird, says: “The val­ue of intan­gi­ble assets is such a sig­nif­i­cant pro­por­tion of a company’s mar­ket val­ue these days that it is crit­i­cal to pro­tect.”

A 2015 report from US con­sul­tants Ocean Tomo reveals that the aver­age intan­gi­ble asset val­ue of the Stan­dard & Poor’s top 500 firms is 84 per cent.

Theft of IP is a growth indus­try, pro­vid­ing good returns at low risk. And the impact on those affect­ed can be dev­as­tat­ing to their rep­u­ta­tion, prof­itabil­i­ty and sur­vival.

Beyond the loss to the indi­vid­ual com­pa­nies, Ed Lewis, part­ner spe­cial­is­ing in cyber, data and pri­va­cy at Weight­mans, says IP crime has a wider impact on inno­va­tion and on the abil­i­ty of west­ern com­pa­nies that are fre­quent­ly the tar­gets, to sell their goods at a com­pet­i­tive price.
“It has a direct impact on the GDP of west­ern economies, but peo­ple do not make the macro-eco­nom­ic link,” he says.

Esti­mat­ing the cost to busi­ness­es is tricky, as most inci­dents go unre­port­ed. A report from US glob­al com­put­er secu­ri­ty soft­ware com­pa­ny McAfee esti­mat­ed that high-income coun­tries lose on aver­age 0.9 per cent of their GDP because of it.

But, says Mr Lewis: “You need to take the sta­tis­tics with a pinch of salt as the scale of the prob­lem is more sig­nif­i­cant than they sug­gest.”

Internal and external threats

It is not a new phe­nom­e­non, but the inter­net has made it eas­i­er, and meth­ods have become more sophis­ti­cat­ed and hard­er to detect, says Michael Eden­bor­ough QC, IP bar­ris­ter at Ser­le Court cham­bers.

“In the old days, you had to phys­i­cal­ly break into an office and steal or pho­to­copy pieces of paper. Nowa­days you can be sit­ting in Roma­nia and hack into a com­put­er in Aus­tralia,” he says.

The threats come from three main sources – exter­nal, inter­nal and bad or old IT that means your sys­tems lack resilience – says Stew­art Room, part­ner and glob­al head of cyber secu­ri­ty and data pro­tec­tion at PwC Legal.

The insid­er threat is com­mon­ly employ­ees exhibit­ing Lau­rel and Hardy-style cyber secu­ri­ty. With “fat-fin­gered neg­li­gence” they send an e‑mail to the wrong per­son or acci­den­tal­ly open a con­t­a­m­i­nat­ed mes­sage, says Mr Room.

annual cost of cyber crime

There may also be moti­vat­ed insid­ers, who are dis­grun­tled, have crim­i­nal intent or see them­selves as whistle­blow­ers.

Exter­nal­ly, hacks can be from organ­ised crim­i­nal gangs. It is far eas­i­er and safer to steal trade secrets than it is to smug­gle hero­in, and the penal­ties if you get caught are low­er, observes Mr Eden­bor­ough.

There are those in the hack­ing com­mu­ni­ty who do it just to show that they can; hack­tivists, who do it to fur­ther an agen­da. Then there is the most sophis­ti­cat­ed of all, state-spon­sored indus­tri­al espi­onage; hack­ing that is sanc­tioned and fund­ed by nation states in order to get tech­nol­o­gy from more advanced coun­tries.

Sur­veil­lance state whistle­blow­er Edward Snow­den claimed Chi­nese hack­ers had stolen Pen­ta­gon blue­prints for the F‑35 stealth fight­er jet, sim­i­lar in design to the sub­se­quent­ly built Chi­nese J‑31. Chi­nese offi­cials denied the alle­ga­tions and the Pen­ta­gon admit­ted breach­es, but said no secret infor­ma­tion had been tak­en.

North Korea dis­missed the notion that it played a hand in the Sony hack in retal­i­a­tion for its release of the film The Inter­view, depict­ing a fic­tion­al assas­si­na­tion of North Kore­an leader Kim Jong-un.

A plethora of techniques

The tech­niques to gain a foothold in tar­get­ed organ­i­sa­tions are man­i­fold, says David Ken­ner­ley, senior man­ag­er for threat research at online secu­ri­ty experts Web­root. They range from oppor­tunis­tic “phish­ing” e‑mails con­tain­ing mali­cious files, to e‑mails point­ing to web­sites that fraud­u­lent­ly col­lect login cre­den­tials.

Tom Phipps, a part­ner in the IP team at law firm Ash­fords, adds “man-in-the-mid­dle” attacks where the attack­er secret­ly inter­venes in com­mu­ni­ca­tions between two par­ties who believe they are direct­ly com­mu­ni­cat­ing with each oth­er.

Oth­er meth­ods, says Mr Ken­ner­ley, require more plan­ning. For exam­ple, “water­ing hole attacks” where a web­site that employ­ees are known to vis­it reg­u­lar­ly is com­pro­mised with the inten­tion of serv­ing mal­ware to the employ­ees through the site.

“The ini­tial aim of any attack is usu­al­ly to obtain login and net­work cre­den­tials or run mal­ware with remote access capa­bil­i­ties, so it can be con­trolled from anoth­er loca­tion,” he explains.

Most com­mon­ly, hack­ers tar­get a link in a company’s sup­ply chain, usu­al­ly a trust­ed part­ner, on the basis that their secu­ri­ty may be weak­er, says Andrew Beck­ett, man­ag­ing direc­tor of cyber and inves­ti­ga­tions at Kroll.

In the event of a seri­ous breach, the ini­tial impact will be the “organ­i­sa­tion­al chaos and dis­tress” felt at a human lev­el, says Mr Room.

“The stress lev­els are tru­ly awe­some in a seri­ous case. I’ve had peo­ple at their wits end, in tears and who haven’t slept for days,” he says. “Every­thing you have to do after a breach will be so new – call­ing the police and deal­ing with the reg­u­la­tors and angry busi­ness sup­pli­ers. The pecu­liar­i­ties, unique­ness and nov­el­ty of it have a mas­sive strain on the mind.”

And when the worst hap­pens, says Mr Phipps, you must have plans and pro­ce­dures in place to respond and mit­i­gate the impact, includ­ing a strat­e­gy to min­imise adverse press cov­er­age.

Building a robust security strategy

The rise of mobile work­ing and reliance on cloud com­put­ing height­ens risks and increas­es the need to min­imise threats. Mr Room advis­es first under­stand what is impor­tant to you and what is IP.

Thor­ough risk assess­ments, and robust poli­cies and pro­ce­dures are essen­tial, Mr Phipps adds.

While Mr Ken­ner­ley advis­es organ­i­sa­tions to build a com­pre­hen­sive “liv­ing” secu­ri­ty strat­e­gy, keep­ing abreast of indus­try infor­ma­tion and secu­ri­ty bul­letins, and fol­low­ing best prac­tice.

“Secu­ri­ty and IT staff need be trained in how to main­tain and man­age any deployed sys­tems; they need to under­stand the alerts and log infor­ma­tion, and to act appro­pri­ate­ly when abnor­mal behav­iour is detect­ed, as well as reg­u­lar­ly test­ing their inci­dent response plan,” he says.

But tech­nol­o­gy is only part of the solu­tion. What is required is a com­bi­na­tion of inter­nal sys­tems, mon­i­tor­ing and, cru­cial­ly, edu­ca­tion to ensure all staff under­stand the risks.

Kroll’s Mr Beck­ett rec­om­mends com­pa­nies write secu­ri­ty stan­dards into con­tracts, either infor­ma­tion secu­ri­ty stan­dard ISO 27001, pub­lished by the Inter­na­tion­al Orga­ni­za­tion for Stan­dard­iza­tion and the Inter­na­tion­al Elec­trotech­ni­cal Com­mis­sion, or the Cyber Essen­tials Scheme, devel­oped by the UK gov­ern­ment.

In addi­tion to fire­walls and appro­pri­ate secu­ri­ty sys­tems, IP bar­ris­ter Mr Eden­bor­ough says com­pa­nies may have two com­put­er sys­tems – one linked to the inter­net and an intranet that can only con­nect to the inter­net through an autho­rised gate­way or is entire­ly iso­lat­ed.

He also sug­gests com­pa­nies hire “poach­ers turned game­keep­ers”. “I’d expect organ­i­sa­tions of any size to a have a ded­i­cat­ed inter­nal anti-fraud unit, staffed by a mix­ture of legit­i­mate sci­en­tists and for­mer police offi­cers, and peo­ple of a less trans­par­ent back­ground,” he says.

How­ev­er, Mr Eden­bor­ough con­cludes: “What­ev­er you do, there is very lit­tle that the deter­mined per­son can’t get.”