Skip Navigation

ITMG Insider Threat News August 31, 2022

LastPass Hackers Stole Source Code

Password management giant LastPass has revealed details of a security incident earlier this month in which proprietary information was stolen by threat actors.

The firm, which claims to have over 33 million global users including more than 100,000 business accounts, said the intrusion took place two weeks ago.

Alleged Cybersecurity Issues of Twitter is Causing a headache for the Firm

Peiter “Mudge” Zatko, the whistleblower, previously served as Twitter’s head of security and reported to CEO Parag Agrawal. Zatko is a well-known ethical hacker and a leading player in the cybersecurity field. As a member of organizations like L0pht and Cult of the Dead Cow, he helped shape much of the early development of the industry.

Zatko described an organization plagued with poor security practices and mismanagement, one that gave way too many insiders unrestricted access to crucial data and platform features, in the disclosure, which was also forwarded to the US Congress and other agencies of the US federal government in July.

Mitigating Risk of Data Leaks in Investigations

Leaked data can be challenging to analyze given the diversity and complexity of the information it includes, ranging from massive listings of customer data to archives of emails, files, and text messages. Some leaked data is available online for only the briefest moment, while other data sets proliferate, copied from site to site. Some leaked data can be accessed with a Google search. Other times a subscription to a specialized vendor or use of a particular tool or technique is required.

Businesses Found to Neglect Cybersecurity Until it is Too Late

Businesses only take cybersecurity seriously after falling victim to an attack, according to a report published by the UK’s Department for Culture, Media and Sport (DCMS) this week.

For the research, the UK government surveyed IT professionals and end users in 10 UK organizations of varying sizes that have experienced cybersecurity breaches in the past three years. This analyzed their existing level of security prior to a breach, the business impacts of the attack and how cybersecurity arrangements changed in the wake of the incident.

One-Third of Popular PyPI Packages Mistakenly Flagged as Malicious

According to a Chainguard analysis of PyPI — the main repository for software components used in applications written in Python — the approach catches 59% of malicious packages but also flags a third of popular legitimate Python packages and 15% of a random selection of packages.

The research aims to create a data set that Python maintainers and the PyPI repository can use to determine the efficacy of their system for scanning projects for malicious changes and supply chain attacks, the Chainguard researchers stated in a Tuesday analysis.

What is an Insider Threat? Understand the Problem and Discover 4 Defensive Strategies

An insider threat is a malicious activity against an organization that comes from users with legitimate access to an organization’s network, applications or databases. These users can be current employees, former employees, or third parties like partners, contractors, or temporary workers with access to the organization’s physical or digital assets. While the term is most commonly used to describe illicit or malicious activity, it can also refer to users who unintentionally cause harm to the business.

Why do insiders go bad? The motivation for insiders vary, most often, breaches are financially motivated. However, breaches can also result from espionage, retaliation or grudge towards the employee, or just carelessness. Insider threats are more common in some industries — such as healthcare, the financial sector and government institutions — but they can compromise the information security of any company.

This entry was posted on Wednesday, August 31st, 2022 at 12:07 pm. Both comments and pings are currently closed.

Discover more from Insider Threat Management Group

Subscribe now to keep reading and get access to the full archive.

Continue reading