Hacks happen everyday, but some breaches remain etched in our memories– either because they involved iconic household brands or due to the sheer magnitude of the event itself. Just as with any historical incident, these infamous events serve as valuable lessons. They remind us of the importance of proactive security measures to protect our organizations from becoming the victim of a similar cybercrime.
Join us as we take a stroll down memory lane and dissect three of the most serious cyber attacks from recent years and discuss how to prevent a similar fate.
First up is Equifax, a multi-national credit bureau that offers individuals online access to their credit score. It goes without saying that they store massive amounts of sensitive and personal data.
When they were breached back in 2017, it led to the exposure of over 140 million Americans’ highly sensitive personal information. This might seem like old news, but as recently as 2023 they were still paying the price for the breach.
Hackers initially acquired access into the Equifax systems because of an unpatched Apache Struts vulnerability. But poor security practices turned a bad situation worse, enabling the attackers to easily move undetected through their systems for over two months.
Here are the key security issues that enabled the breach:
The fallout for Equifax included:
If that’s not enough, 6 years after the breach, Equifax is still paying for the incident – in October 2023, UK watching Financial Conduct Authority fined the company a further $13.4 million.
Like most others, this incident could have been avoided with some basic security hygiene including:
Next, let’s talk about Uber. The ride sharing enterprise has been breached not one, but three times. The latest one happened in January 2023 via a third-party vendor, Genova Burns LLC. Genova Burns LLC is a law firm that has access to Uber driver records. The breach resulted in the personal data of over 77,000 Uber and UberEats drivers being stolen, including their names and social security numbers.
The breach augments existing criticism of Uber’s history of security lapses
After their drivers’ sensitive personal information was compromised for a third time, the consensus amongst security experts is clear. Uber must reinforce both their technical and human vulnerabilities across their entire ecosystem of access.
This latest incident marks their second breach in just six months, sparking renewed scrutiny of their security posture.
What do the experts say?
• Uber’s “traditional approach” to cybersecurity doesn’t cut it.
• There’s a need for end-to-end security versus their current siloed approach.
• They need to minimize vulnerabilities from supplier and partnership access through 3rd party risk management.
• Uber needs to reduce human-related vulnerabilities through employee security awareness as well as implementing stricter technical controls.
Poor security practices and slow response can turn a bad situation worse. That was the case when attackers targeted JBS, a meat processing giant, with a ransomware attack in 2021. The attack resulted in halted operations until they paid up.
In May 2021, a ransomware attack on JBS disrupted operations globally until an $11 million ransom was paid.
JBS had rampant malware and was “extremely slow” to address their vulnerabilities, which is especially worrying as food production is part of critical infrastructure. In addition, their attack surface was made even larger through lack of segmentation and a high prevalence of outdated systems– weaknesses which made them a tasty target for cybercriminals and ripe for exploitation.
Post-attack, the FBI warned the sector of increased targeting. Breaches occur daily but rarely become public. JBS highlights the need for basic security hygiene like patching and upgrading legacy systems.
The attack itself began months prior and progressed through these common stages:
• Employee credentials were leaked online.
• Hackers infiltrated systems and extracted data.
• Ransomware was activated, resulting in halted operations.
This attack highlights how aging infrastructure and relaxed security practices can result in a costly fallout and underscores the critical need for modernization and resilience across the food supply chain.
What makes things worse is that the entire scenario could have been avoided through basic security hygiene including:
According to Verizon, about 9 out of 10 security breaches could be prevented with proper security measures in place.
If we can take anything away from these three examples it’s that, in many cases, breaches are preventable. By understanding the attack vectors threatening your organization’s data and infrastructure and implementing a proactive security strategy, you can significantly reduce the risk of becoming tomorrow’s news.
One of the most effective ways to do this is to practice Attack Surface Management. By evaluating your digital assets through the eyes of a hacker, you gain a clearer understanding of your organization’s digital footprint and how malicious actors might exploit vulnerabilities associated with it. This enables you to take swift, prioritized actions to remediate risks and fortify your defenses.
Attack Surface Management is the systematic process of:
Proactively managing your attack surface is more than just a strategy, it’s a necessity in today’s threat landscape.