As many as 84 million bank account details have been illegally accessed during a cyber attack on one of America’s largest bank’s this summer, it has been revealed.
JPMorgan Chase & Co said that 76 million household accounts and 7 million small business accounts were at risk of compromise during the security breach.
Names, phone numbers, addresses and email addresses were among the data stolen. But how much more do we know about this massive cyber attack? And what lessons can we learn from it? Here’s what the exerts have to say:
“Yet another breach of a huge amount of personal information but little detail of how the attack occurred is disclosed. Was it a phishing attack directed towards a JP Morgan employee, a zero day vulnerability utilised or simply a poorly configured edge device giving access? Organizations would benefit from more information sharing between investigators and interested affected parties, but today’s business environment does not support that as common practice. We need to take a closer look at why it’s problematic to share and what’s being done to improve information sharing. This would benefit every other business defending against attack.”
Another day, another cyber-attack. These malicious crimes continue to grow in frequency, size and complexity, making the issue of cyber security one of upmost importance for the industry. According to research from Fujitsu UK & Ireland, only 9% of consumers believe that organisations are doing enough to secure their data. The research also revealed that although every industry has seen a drop in trust over the last 10 years, it was the financial sector that had lost the most trust with customers.
Senior managers within the industry know that the such attacks can both damage the business and its reputation with customers, which is why they are investing heavily in staying one step ahead of the criminals. They continue to invest in the latest security tools, in ensuring that staff have the latest, most up-to-date skills, as well as in preparing appropriate contingency plans for use in the still-rare occasions when defences are breached. We should all remember that the banks successfully foil many more attacks than ever get reported in the media.
“The good news on this story is the fact that the time to detect the breach is significantly shorter than the average. But it does still indicate the huge challenges every business has against the increasingly complex threat landscape. My concern now is making sure that the lessons are learned and that information security and risk management are embedded into the business to protect personal data . Also as we have seen through the Global Threat Intelligence report, how they manage the incident is also critical”.
“It’s not always losing a username and password that’s directly the problem, although that’s very serious. Loss of data such as names, e-mail addresses, home addresses and phone numbers are all part of the jigsaw that make up a persons digital presence, and can form a good basis for further targeted attacks on that individual and the other services they use. How many people will be getting phishing phone calls as a result of their phone number being lost in this breach, with the caller using other information to try and prove that they are genuine?”
“It remains unclear whether this is a second, separate incident, or simply further discovery of how far the first compromise reaches. The initial identified scope of a breach is hardly ever the full picture. All other large financial institutions should take note of this incident, and not only scrutinise their defenses, but prepare for a public response before it’s needed. Large banks like JP Morgan are under constant cyber-attack, and they thwart the majority of attempted break-ins. While there’s little doubt that JP Morgan has taken action since the original incident was reported, the size and complexity of their network means they are unlikely to have rolled out new protections comprehensively by now. In situations like this, time is always the enemy.”
“Initially, sophisticated hackers are interested in reconnaissance, this allows them to identify several points of weakness. They also look for way to make changes to the bank’s systems that allow them to ‘hide’ in several places at once. Eliminating them in one place doesn’t mean you’ve found them everywhere.”
How much do you know about hackers? Take our quiz!
Thoma Bravo agrees to acquire Darktrace for $5.32 billion in cash, delivering some welcome news…
Customer adoption of AI services embedded in cloud services continues to deliver results for Microsoft,…
TikTok's 'secret source' algorithm is so core to ByteDance, it would rather shut down US…
After relocating from California to Texas in 2020, Oracle's Larry Ellison now reveals plan to…
Share price hit after Meta admits heavy AI spending plans, after posting strong first quarter…
For third time Google delays phase-out of third-party Chrome cookies after pushback from industry and…