Cyber Crime - In Stealth

You know the feeling when you walk into a room and people are containing their laughter.  You know that they are laughing at you, but you don’t know why?  Well I wonder if any Nortel executives had that feeling for almost a decade when hackers had access to Nortel’s computers from 2000 to 2009 as reported by the Vancouver Sun here.  Generally when most think of a Cyber Crime we think of the events that it makes the front page news like the Sony data breach of 100,000,000 records in 2011 or the targeted industrial attack of Stuxnet that sabotaged Iran’s uranium enrichment facility in 2010.  But the hackers in the Nortel case are the cat burglars of cyber space.  They did not want to be noticed so that they could continue to mine Nortel’s data until Nortel went out of business.

In the article “Canadian Law Firms Hacked” by Jeremy Hainsworth here he has a great discussion with Daniel Tobok of Digital Wyzdon Inc. who talks about targeted stealth attacks. Some of the best quotes from the article include: “On the way out, it was that sophisticated that it started cleaning its own tracks.”  “Only experts to a point can clean up their own tracks”.  “Another day or two and it would have been completely clear…” “Only on a government level can someone go to that length of expertise.”  China is often blamed but Tobok goes on to say “The Russians cover their tracks by making it look like it’s coming from China…”

The front lines have travelled to cyber space.  While the number of breaches reported is escalating quickly, how many are going unnoticed?  Many do not realize that they are victims and those that do would rather not let anyone know about it.  The Personal Information Protection and Electronic Documents Act PIPEDA  in Canada does not currently require organizations to notify the commissioner’s office.  Mandatory reporting of data breaches is already widespread in the U.S. and we could see it in Ontario in the near future here (see Q7).  I wonder how many executives have done some research and came across Ponemon’s “Second Annual Cost of Cyber Crime Study” here, did the math on their possible exposure to a breach of their customer’s data resident on their system and swallowed hard when they realized that their company could have a large unfunded, yet to be disclosed, liability.   If you use Ponemon’s (un-statistical, see caveats) estimate of $214 per customer record breach it adds up in a hurry.  Good luck Sony. 

“Surprisingly, although SMBs (Small & Medium Business) know the dangers of cyberattacks, they don’t feel they are at risk. In fact, half of SMBs think that because they are a small company, they aren’t in danger – it’s primarily large enterprises that have to worry about attacks. This is in direct contrast to the evidence.  According to data from Symantec.cloud, since the beginning of 2010, 40 percent of all targeted attacks have been directed at companies with fewer than 500 employees, compared to only 28 percent directed at large enterprises.” Symantec Survey

Insurance policies are available to fund the Third and First Party exposures of a data breach claim.  They are new, complex, diverse in the range of coverage offered and require expert handling.  Of course they all exclude breaches that you are already aware of.  So while it is a good idea to fortify your Security Information and Event Management (SIEM) solutions to get a better handle on you network, you may wish to get your Cyber Liability policy in place before you learn too much more. 

Gordon Collins is with Mitchell Sandham Inc, a (truly) independent company providing commercial, private client and financial services insurance.  His focus is on Commercial & Executive Liability and he be contacted at gcollins@mitchellsandham.com or (416) 862-1750.
 

Posted: 2/17/2012 1:03:56 PM by MSI
Filed under: Breach, Claims, Cyber, CyberRisk, Data, Insurance, IT, Liability, Network, Policy, Security


Comments
Blog post currently doesn't have any comments.
Blog posts

Tags

-, &, (British, (Supreme, :, 168, 198, 31-103, 41-101, 41-103, 45-102, 45-106, 51-102, 51-106, 52-109, 65, A, AB, Accident, Accountant, accountant’s, Acquisitions, Act, action, adequacy, Adequate, Advice, advisor, Advisors, Aggregate, aHead, Al, Allocation, amendments, AML, and, anti-bribery, anti-money, Appeal), arbitration, Articles, asked, asset, Attacks, auditor, Auto, Aviva, Avoiding, awareness, backup, Bank, bankruptcy, Banks, bcca, benchmarking, Benefits, Bill, Bond, breach, Breaches, Bribery, Brito, broadband, Broker, Brokerage, Brokers, Business, Bylaws, BYOD, C-28, c-45, Canac, Canada, Canada), Canadian, Car, care, Cars, case, cause, CBC, certification, CFPOA, CGL, Chartis, CI, City, claim, Claims, class, clients, Collar, Collections, Columbia, Commercial, commmunications, Community, company, Competition, Compliance, conditions, Conference, consumer, Continuity, contract, Contractors, Contractual, Control, Corporate, Corruption, Costs, Cottage, Court, Coverage, coverages, Crime, Crime , Cromwell, CSA, CSPE, Curruption, Cyber, CyberRisk, Cyber-Security, D&O, Damage, DANDO, Data, Dealers, Decision, decisions, defence, Defend, Designers, DesignThinkers, Director, Directors, directors’, Directorship, disclosure, dishonesty, dismissal, driving, Duties, duty, E&O, eando, election, Elite, Embezzlement, EMD, employee, Employment, Energy, enough, Entity, EPL, Errors, example, Examples, Excess, Executive, Executives, exempt, Extortion, Facie, FCPA, FIB, fidelity, fiduciary, Financial, fines, Fischer, Flooding, Follow-Form, for, franchise, Franchisor, Fraud, fund, Funding, Funds, Game, gatekeepers’, General, Governance, Graphic, Greg, Griffiths, Growth, Hacking, Head, health, high, Home, Homes, Housing, How, HR, human, IBC, Identity, IFRS, IG, IMAX, in, Indemnification, Independent, indeterminate, Individuals, Information, Injury, Insider, Institution, Institutions, Insurance, investigation, investigations, Investment, irectors’, is, IT, J, Jobs, jolian, K&R, Karigar, Kevin, Kidnap, Kitchen, LaCroix, laundering, lawyers, Layering, Learn, Liability, limit, limits, lines, Litigation, long, Long-Term, look, Loss, M&A, Magazine, Managament, Management, Managers, Mansions, market, Media, mediation, Mergers, misrepresentation, Mitchell, month, Morrison, Mortgage, MTO, much, mutual, National, negligence, net, Network, new, News, NI, Niko, Non, notice, occupational, Occupy, Occurrence, ODL, of, officer, Officers, officers’, Offices, OHSA, Omissions, Ontario, OSC, Outside, PanamaPapers, Partners, Payments, PCMLTFA, penalties, Pennyfeather, Pension, Personal, Physician, Piercing, PIPEDA, Plan, PlatinumPro, policy, Practices, premiums, Presumptive, Prevention, pricing, Prima, Priority, Privacy, Private, products, Professional, Profit, program, Properties, Property, proposed, prospectus, Prosperity, Protection, protections, Ransom, reasonable, receivership, Recovery, Registered, regulatory, Reputation, Reputational, rescission, resident, Resources, restoration, Retail, review, RGD, Rgesitered, Risk, Rosen, rules, Ryan, SABS, Safety, sandham, scc, Seasonal, secondary, Secruity, Secuirty, securities, securitized, Security, Service, Severability, sewer, Share, Sherbourne's, Shields, Side, Silver, sino-forest, Small, SNC, SNC-Lavalin, Social, Society, Solar, solicitor-client, Sponsor, Ssndham, statistics, Statutory, Stores, storm, Subsidy, Supplier, Support, Supreme, Tagged:, tail, the, theft, Threats, Timminco, Tips, tires, to, Top, Toronto, Trading, trapeze, trust, tsx, UK, Uninsured, unique, v., Valuable, Valued, vehicle, veil, watch, Water, Whistleblowing, White, Wiki, Willis, Wine, Winter, within, without, worth, wrongful, XBRL