Deloitte Hack Still Has More Questions Than Answers

  /     /     /  
Publicated : 22/11/2024   Category : security


Deloitte Hack Still Has More Questions Than Answers


The huge hack of global accounting firm Deloitte is still presenting more questions than answers for security professionals.



Two days after an email admin security weakness was first reported, Deloitte is still not saying much about it. Nothing has been posted on the Deloitte Website and the publics righteous thirst for information goes unquenched. As a PR operation, it sucks. As an attack that could apparently have been easily prevented, its a disaster.
Coming within two weeks of revelations about unsecured Equifax consumer data, the Deloitte problem seems to be on a smaller numerical scale, but the market value of the exposed data is unknown. Equifax exposed the private consumer information of about 143 million people in the US and the UK. In what little Deloitte has said, it quantifies its data loss to information it holds of about six clients. Data exposure was apparently caused by theft and exploitation of super-user admin authentication details for an email platform -- which looks like it could easily have been avoided.
Two-factor security -- or the lack of it -- seems to be behind the relative ease of ingress as an attack gained access to confidential email information including text and attachments. Reportedly, data containing email addresses, usernames, passwords, IP addresses, architectural diagrams for businesses and health information may have been exposed by Deloitte adversaries. The extent is as-yet unknown, but given that Deloitte is suspected to have discovered the intrusion as early as October 2016, observers are questioning the scale of the breach versus public disclosure to date.
Deloitte should have hired Deloitte, Ajit Sancheti, co-founder and CEO at Preempt Security, told SecurityNow referring to Deloittes renowned cybersecurity consultancy business. They seem to have had a
laissez faire
attitude to security. Even though they teach best security practice to their clients, they just didnt employ it internally. In this case, somehow, they allowed access to private credentials because there was no multifactor security [present].
He speculates that when Deloitte first discovered the exploit in 2016, they thought it was a small enough incident to comfortably handle internally. But then it became bigger, and theyve struggled to offer enough actionable information to clients without risking losing them.
Its very difficult for them to be able to do that, said Sancheti. Have they shown that they have done enough to operate within best practice here? Thats still not clear to me. If Deloitte was compromised, did anyone actually see that at the time? To date its unclear how long the intrusion went unnoticed, or even if the intruder is still active in any capacity.
Deloitte is not being unfairly targeted for criticism. But many big enterprises are still tussling with security, and are not making good of it. Thats not because theyre unaware of the security risks, but because practically speaking, they are spending too much time triaging possible security concerns that require a solution. Hackers are probing everywhere, and... well, they might just be security fatigued and unable to make good decisions, like a climber snow-blinded on a mountain pass.
In fairness, all large organizations are really struggling, Sanjeev Verma, founder and chairman of PreVeil told SecurityNow. Verma founded Airvana, the worlds second-largest supplier of CDMA-based data infrastructure in 2000, and now hes back for another challenge. The widespread security paradigm is perimeter defense, but that just doesnt work: companies continue to build walls around data, but no matter how tall they make the walls, people always find a way in.
Want to learn more about the tech and business cases for deploying virtualized solutions in the cable network? Join us in Denver on October 18 for Light Readings
Virtualizing the Cable Architecture event
– a free breakfast panel at SCTE/ISBEs Cable-Tec Expo featuring speakers from Comcast and Charter.
Vermas firm has patented a new approach which follows his philosophy and assumes that servers, for example, will continue to be breached. PreVeil posits end-to-end encryption across the entire data lifecycle, so that servers never have access to unencrypted data. So, in theory, someone can set up a siege engine and storm the walls -- typically using brute-force, exploiting a vulnerability or targeting a super-user, as in the case of Deloitte. But all they get in PreVeils new paradigm, is encrypted non-sequitur.
Recent attacks on apparently bulletproof institutions have the appearance of hacking individuals or groups wanting to make a point or running a vendetta; Deloitte may have become an honor-target because of the very cybersecurity practice it runs. Equifax may have been brought low by hackers interested in smearing the name of a company charged with large-scale security of intimate consumer data.
CCleaner may have been targeted
because the small PC cleanup utility was being acquired by security giant Avast.
There will be more attacks and more panic. I guess we may know more [about motivations] in the next few weeks, said Sancheti.
Related posts:
Right & Wrong Lessons From the Equifax Breach
NIST Redefines the Good Password
Dragonfly Targets US Nukes
— Simon Marshall, Technology Journalist, special to Security Now

Last News

▸ Feds probe cyber breaches at JPMorgan, other banks. ◂
Discovered: 23/12/2024
Category: security

▸ Security Problem Growing for Dairy Queen, UPS & Retailers, Back off ◂
Discovered: 23/12/2024
Category: security

▸ Veritabile Defecte de Proiectare a Securitatii in Software -> Top 10 Software Security Design Flaws ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Deloitte Hack Still Has More Questions Than Answers