Houston Astros Breach A Wake-Up Call On Industrial Cyber Espionage

  /     /     /  
Publicated : 22/11/2024   Category : security


Houston Astros Breach A Wake-Up Call On Industrial Cyber Espionage


The St. Louis Cardinals alleged breach of the Astros proprietary database raises concern over the possibility of US companies hacking their rivals for intel.



Cyber espionage traditionally has been the domain of nation-states spying for intelligence-gathering and stealing intellectual property, but the 
recent cyber-theft of information from the Houston Astros baseball teams proprietary scouting and team information database
sheds light on the prospect of business-on-business cyberspying.
The breach of the Astros database allegedly by members of the St. Louis Cardinals organization was a rare case, exposing one organization cyberspying on another; security experts say its the first such attack in the sports world that has come to light. But competitive intelligence-gathering and spying -- whether its casual conversations with a competitor, shoulder-surfing, deciphering a team managers signals in mid-game, or even extreme cases like bugging conference rooms -- long have been a real threat and concern among corporations and sports organizations, experts say.
It should come as no surprise that industrial cyber espionage would become a nefarious option for companies outside the nation-state realm to keep tabs on, or to gain a competitive advantage over, rivals in their industry, security experts say.
The recent focus on anything cyber espionage-related fingers overseas [threats] and foreign group attacks against the US and others, says Nick Pelletier, senior consultant with incident response firm Mandiant, a FireEye company. Theres not a lot of discussion on things such as someone in the US hitting someone else in the US to date.
This is a wake-up call, he says of the Astros breach.
Cases of one business spying on another in the US are unusual, and nowhere near the threat or pervasiveness of nation-state cyberspying. Mandiants Pelletier says he hasnt seen any cases of business-on-business cyber espionage as yet, but its something the firm is tracking.
Its something weve been sort of keeping our eye on, he says. The most common form of industrial espionage to date, he says, is a physical attack, whether its bribery or an insider leaking information for profit or other reasons. Most organizations dont have the ability to pull off an actual cyberattack, anyway, he says, so old-school espionage is a more common tack.
Former FBI cyber special agent and supervisory special agent Andre McGregor says the agency has seen industrial cyber espionage cases from time to time, some of which have involved a business using nefarious hacker-for-hire services to do their dirty work. These have been more one-off intrusions rather than the norm, accounting for a small percentage of all cyber espionage, he says.
The FBI and other law enforcement agencies have been investigating and watching hacker-for-hire operations for years now, says McGregor, who recently joined Tanium as a director of cybersecurity. These are typically nation-state hackers who moonlight as cyber-mercenaries, he says.
As for the Astros breach, McGregor says,Traditional corporate espionage has now entered cyberspace.
Meanwhile,
initial reports
that the breach occurred via a list of reused passwords by Astros general manager Jeff Luhnow, who worked for the Cardinals organization from 2003 until 2011 when he took the job with Houston, were shot down today, as 
Luhnow told
Sports Illustrated

that he did not use the same passwords he had used while with St. Louis. The breach itself was first discovered and publicized in June of 2014 when some data was posted online on Anonbin; this week was the first time the Cardinals organization had been publicly implicated in the FBI investigation.
Cardinals officials reportedly may have been worried that Luhnow had taken their teams proprietary information with him to the Astros, an allegation Luhnow also dismissed in his interview with
SI
.
Adam Meyers, vice president of intelligence at CrowdStrike, says business-on-business cyber spying is rare and definitely not at the same level of sophistication as a nation-state attack would be. Breaking and entering is a better way to describe the alleged attack on the Astros database, he says. They [reportedly] got access to information they werent authorized to have, he says.
Industrial espionage [itself]
 is
a thing, Meyers says. Businesses have sweeps of boardrooms before big meetings, for example, he points out.
What the Astros breach illustrates is that the business side of sports organizations and all enterprises need to take cybersecurity threats more seriously, he says. Information security isnt a computer nerd problem anymore. Its a business problem and needs to be treated as such, Meyers says. If you are only relying on computer nerds to defend against these kinds of things, your business is at risk of attack, he says.
You need to know from a business perspective how things are going to impact you, he says.

Last News

▸ Startups address secure corporate data access from personal devices. ◂
Discovered: 26/12/2024
Category: security

▸ SCADA Security Challenges Highlighted by Google Building Management System Hack. ◂
Discovered: 26/12/2024
Category: security

▸ Tech companies launch competition for educational apps. ◂
Discovered: 26/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Houston Astros Breach A Wake-Up Call On Industrial Cyber Espionage