The Equifax data breach in which millions of Americans had their personal details stolen may have been carried out by a foreign government in a bid to recruit U.S. spies, experts believe.
Off the back of this, please see comments from Terry Ray, senior vice president and Imperva fellow who talks about how this is a sign of the growing trend of global cyberwarfare.
“The way I see it, the fact that the stolen Equifax data hasn’t appeared in 18 months is no “great mystery” at all – it’s just a likely confirmation that the attacker was a nation-state, which aligns with the current trend in global cyberwarfare. These sophisticated state-sponsored hacker armies are no longer just focusing on attacking government agencies and other traditional targets, but also civilian enterprises and civilian data, largely in an attempt to sow discord and confusion. About three years ago, the U.S. Department of Defense issued a warning that foreign nation-state hackers were targeting not only government contractors with advanced persistent threats (APTs), but also academic institutions. The FBI reportedly issued a similar warning on the same day, indicating that Chinese hackers were equally interested in compromising sensitive data held by commercial enterprises in the U.S.
It’s no surprise this trend has continued. After all, nation-state hackers aren’t going after the private sector in the absence of anything better to do. They’re doing it because their efforts can pay off big dividends in the long run when it nets them secret and useful economic, military and national-security information down the road.
In order to ensure protection, organisations need to be far more informed about their data – and not just the data they perceive as top priority. They have to rely on more than their internal priorities alone because so many other perspectives and variables are at play. The only thing they can do, then, is to watch their data. All of it.”
ISBuzz Team embodies the collaborative efforts of the dedicated staff at Information Security Buzz, converging a wide range of skills and viewpoints to present a unified, engaging voice in the information security realm. This entity isn't tied to a single individual; instead, it's a dynamic embodiment of a team diligently working behind the scenes to keep you updated and secure. When you read a post from ISBuzz Team, you're receiving the most relevant and actionable insights, curated and crafted by professionals tuned in to the pulse of the cybersecurity world. ISBuzz Team - your reliable compass in the fast-evolving landscape of information security
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.