The Times Australia
The Times World News

.
The Times Real Estate

.

Why are there so many data breaches? A growing industry of criminals is brokering in stolen data

  • Written by James Martin, Senior Lecturer in Criminology, Deakin University
Why are there so many data breaches? A growing industry of criminals is brokering in stolen data

New details have emerged on the severity of the Medibank hack[1], which has now affected all users. Optus, Medibank, Woolworths, and, last Friday, electricity provider Energy Australia are all now among the household names[2] that have fallen victim to a data breach.

If it seems like barely a week goes by without news of another incident like this, you would be right. Cybercrime is on the rise – seven major Australian businesses[3] were affected by data breaches in the past month alone.

But why now? And who is responsible for this latest wave of cyber attacks?

In large part, the increasing number of data breaches is being driven by the growth of a global illicit industry that trades in your data. In particular, hackers known as “initial access brokers” specialise in illegally gaining access to victim networks and then selling this access to other cyber criminals.

The cyber crime ecosystem

Hackers and initial access brokers are just one part of a complex and diversifying cyber crime ecosystem[4]. This ecosystem contains various cyber criminal groups who increasingly specialise in one particular aspect of online crime and then work together to carry out the attacks.

For example, one of the fastest-growing and most damaging forms of cyber crime – ransomware attacks – involves malicious software that paralyses a victim’s device or system until a decryption key is provided following payment of a ransom.

Read more: What is ransomware and how to protect your precious files from it[5]

Ransomware attacks are big business. In 2021 alone, they earned cyber criminals more than US$600 million[6]. The huge amounts of money to be made in ransomware, and the rich abundance of targets from all around the world are fostering the development of a vast ransomware industry.

Ransomware attacks are complex, involving up to nine different stages[7]. These include gaining access to a victim’s network, stealing data, encrypting a victim’s network, and issuing a ransom demand.

Specialist criminals

Increasingly, these attacks are carried out not by lone cyber criminal groups, but rather by networks of different cyber crime groups, each of which specialises in a different stage of the attack.

Initial access brokers will often carry out the first stage of a ransomware attack. Described by Google’s Threat Analysis Group[8] as “the opportunistic locksmiths of the security world”, it’s their job to gain access to a victim’s network.

Once they have compromised a victim’s network, they typically sell this access to other groups who will then steal data and deploy the ransomware that paralyses the victim’s computer systems.

There is a massive and growing underground market for this type of crime. Dozens of online marketplaces on both the dark web and surface web[9] offer services from initial access brokers.

Their access to companies can be purchased for as little as US$10[10], although more privileged, administrator-level access to larger companies often commands prices of several thousands of dollars[11] or more.

Responding to the growing cyber threat

Over the past month, we have seen several instances[12] of cyber criminals forgoing actual ransomware. Instead, they sought to directly extort companies by threatening to publicly release any data they have stolen.

While not as devastating as a ransomware attack, data breaches can cause serious financial and reputational damage to an organisation (just ask Optus chief executive Kelly Bayer Rosmarin[13]), not to mention major problems for any customers or clients who now have their private information released online.

Read more: I've given out my Medicare number. How worried should I be about the latest Optus data breach?[14]

In the final six months of 2021, more than 460 data breaches[15] were reported to government authorities. Even more worryingly, this number is almost certainly an underestimate.

While companies with a turnover of more than AU$3 million are required by law to report data breaches involving personal information, most small businesses are not subject to mandatory reporting laws. Therefore, they have little incentive to report a data breach that could scare off customers and damage their brand.

Taking action against cyber crime

So what can we do about it? In the first instance, companies need to rethink their approach to data. Data should be treated not simply as an asset that can be freely held and traded in, but also as a liability that needs to be carefully protected.

Some experts[16] are calling for Australia to follow the European Union’s approach and to introduce stricter corporate regulations that better protect consumer data.

This week the federal government also introduced plans to fine companies[17] that do not maintain sufficient cyber security and suffer repeated data breaches.

Read more: After the Optus data breach, Australia needs mandatory disclosure laws[18]

Reforms like this could help, particularly in preventing relatively unsophisticated data breaches, like the one that recently affected Optus[19].

On the other hand, punitive fines towards victims could further strengthen the hand of entrepreneurial cyber criminals – they could try to leverage these fines to further extort their victims.

There is no silver bullet to solving the threats posed by cyber criminals. At a minimum, both government and industry must continue to work together to improve our cyber defences and resilience. Through research, we must also work to better understand the global cyber crime ecosystem as it continues to evolve.

References

  1. ^ the severity of the Medibank hack (www.abc.net.au)
  2. ^ household names (www.theguardian.com)
  3. ^ seven major Australian businesses (www.news.com.au)
  4. ^ cyber crime ecosystem (www.sciencedirect.com)
  5. ^ What is ransomware and how to protect your precious files from it (theconversation.com)
  6. ^ US$600 million (blog.chainalysis.com)
  7. ^ nine different stages (eprints.whiterose.ac.uk)
  8. ^ Google’s Threat Analysis Group (blog.google)
  9. ^ surface web (www.kaspersky.com.au)
  10. ^ as little as US$10 (go.recordedfuture.com)
  11. ^ several thousands of dollars (www.digitalshadows.com)
  12. ^ several instances (www.theguardian.com)
  13. ^ Optus chief executive Kelly Bayer Rosmarin (www.smh.com.au)
  14. ^ I've given out my Medicare number. How worried should I be about the latest Optus data breach? (theconversation.com)
  15. ^ more than 460 data breaches (www.oaic.gov.au)
  16. ^ Some experts (www.sbs.com.au)
  17. ^ introduced plans to fine companies (www.smh.com.au)
  18. ^ After the Optus data breach, Australia needs mandatory disclosure laws (theconversation.com)
  19. ^ recently affected Optus (thenewdaily.com.au)

Read more https://theconversation.com/why-are-there-so-many-data-breaches-a-growing-industry-of-criminals-is-brokering-in-stolen-data-193015

The Times Features

Seamless Kitchen Sink Installation: Achieving a Perfect Fit

A seamless installation needs to be well-planned. Site, material, and process all go into the final outcome. Installing a new piece or replacing a very old piece, exactness is ...

Studies of Parkinson’s disease have long overlooked Pacific populations – our work shows why that must change

A form of Parkinson’s disease caused by mutations in a gene known as PINK1 has long been labelled rare. But our research[1] shows it’s anything but – at least for some popula...

A Simple Guide to Assembling a Home Electrical Toolkit

Having a well-equipped home electrical toolkit is essential for any homeowner. It allows you to tackle minor repairs and conduct routine maintenance with confidence. Imagine the ...

48 Hours in Hobart: The Ultimate Weekend Itinerary

Nestled between the towering Mount Wellington and the sparkling waters of the Derwent River, Hobart is a charming city that offers an intriguing blend of natural beauty, rich histo...

Lunchtime Facelifts: Quick & Effective Procedures for Busy Professionals

Busy professionals often find themselves juggling demanding careers, family obligations, and social commitments. With such a tight schedule, it can be difficult to make time for ...

Visual Guide to Distinguishing Ants from Termites

Distinguishing ants from termites is crucial for homeowners who wish to protect their properties from structural damage. These tiny creatures, though seemingly unthreatening, can...

Times Magazine

First Nations Writers Festival

The First Nations Writers Festival (FNWF) is back for its highly anticipated 2025 edition, continuing its mission to celebrate the voices, cultures and traditions of First Nations communities through literature, art and storytelling. Set to take ...

Improving Website Performance with a Cloud VPS

Websites represent the new mantra of success. One slow website may make escape for visitors along with income too. Therefore it's an extra offer to businesses seeking better performance with more scalability and, thus represents an added attracti...

Why You Should Choose Digital Printing for Your Next Project

In the rapidly evolving world of print media, digital printing has emerged as a cornerstone technology that revolutionises how businesses and creative professionals produce printed materials. Offering unparalleled flexibility, speed, and quality, d...

What to Look for When Booking an Event Space in Melbourne

Define your event needs early to streamline venue selection and ensure a good fit. Choose a well-located, accessible venue with good transport links and parking. Check for key amenities such as catering, AV equipment, and flexible seating. Pla...

How BIM Software is Transforming Architecture and Engineering

Building Information Modeling (BIM) software has become a cornerstone of modern architecture and engineering practices, revolutionizing how professionals design, collaborate, and execute projects. By enabling more efficient workflows and fostering ...

How 32-Inch Computer Monitors Can Increase Your Workflow

With the near-constant usage of technology around the world today, ergonomics have become crucial in business. Moving to 32 inch computer monitors is perhaps one of the best and most valuable improvements you can possibly implement. This-sized moni...

LayBy Shopping