September 9, 2016
-
Joe Franscella
,

Privacy: A Cyber Report

<p>Privacy is important as a personal matter. In this cyber report, we will discuss the external implications of compromises to both personal privacy and confidentiality for businesses and other organizations.</p><p>Early reports of privacy crises in the aftermath of a hack dealt mostly with personally identifying information. This is specifically data such as person’s date of birth, address, etc. These details are enough for hackers to make unauthorized purchases, create fraudulent bank accounts and the like. Identity theft can be catastrophic and may take years before fraudulent activity subsides. Banks and other institutions are more prepared to resolve these messes, but hackers have more info to work with since both individuals and companies have begun putting more about themselves online.</p><p>Threat intelligence can alert you to invasive hacks. Ideally, you are alerted before the hacker is successful. Considering many hacks go undetected for months, expedient alerts are sometimes a more reasonable goal. The internet of things can open up a new frontier of hacking applications. As we have allowed tech to become a prevalent element of our homes, bodies and our children’s lives, vulnerabilities have multiplied exponentially.</p><p>In the early days of the Internet, publishing platforms were not so user friendly as today. Most personal info accessible to hackers contained sterile facts like account info and personnel records. Since publishing via the social web has become prevalent, hacking into personal accounts resulted in more personally offensive hacks. In non-financial cases, a hack could be a <a href="http://www.thewrap.com/ghostbusters-star-leslie-jones-website-suffers-horrific-vandalism-by-hackers/" target="_blank">pointed act of vandalism</a> which boarders on terrorism. It’s difficult to conceive, but there are malicious hackers who just don’t make a living on the black market. Some cyber-criminals hack for spite or to engage in <a href="{page_3346}" target="_blank">high tech voyeurism</a>. Whether it’s a coworker unknowingly snooping to see what’s on your pay slip or a full on doxing, individuals suffer when private files are leaked. Businesses can be affected by embarrassing hacking scandals which result in diminished consumer confidence or outright public humiliation.</p><p>There is a capability to share evidence collected from your logs with others. Threat intelligence platforms analyze client network traffic for successful breaches and attempted break-ins. With sharing of threat indicators, there is a privacy concern. In order to collect this information, it must be volunteered by actual hacking victims. Therein lies the problem; indicators of compromise can potentially reveal too much. One approach to address this concern is standardization of threat intelligence including best practices about anonymizing it. Another is channeling salient details to be <a href="{page_253}">shared only within trusted communities</a>.</p><p>Government and police surveillance differs by locality. The adage about not needing privacy if you don’t have anything to hide is not applicable here. In Western society, we regard privacy as an inherent human right which only should be <a href="https://www.aclu.org/whats-wrong-public-video-surveillance" target="_blank">compromised when absolutely necessary</a>. Confidentiality can be a legal matter. There have been allegations of hacks for an unfair advantage in liability cases. In one case, an insurance firm was found to have <a href="http://www.abajournal.com/news/article/insurers_hacked_tens_of_thousands_of_legal_files_to_get_an_edge_in_workers" target="_blank">hacked the confidential cloud storage space</a> to access 30,000 legal files.</p><p>Adequate privacy means different things to different people. If you take away anything from this cyber report, it’s that you must decide what degree of transparency you are comfortable with and work to preserve it.</p><p> <span class="hs-cta-wrapper" id="hs-cta-wrapper-bd3e320b-6f5f-47ad-ae30-589597d266a4"> <span class="hs-cta-node hs-cta-bd3e320b-6f5f-47ad-ae30-589597d266a4" data-hs-drop="true" id="hs-cta-bd3e320b-6f5f-47ad-ae30-589597d266a4" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="{page_3457}" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=bfe9d714-b9a1-4733-8b89-44b169eb6a53&amp;placement_guid=bd3e320b-6f5f-47ad-ae30-589597d266a4&amp;portal_id=458120&amp;redirect_url=APefjpE8sat2ELeWs38qQGgIg6VltETq3hDl8SB9KJxBc_sBVlWleNVEw9AODoNZt88627kF7Cm11aMeY_p6LkVf_rqwWo4vCx_s1jlV85ojL0c5CVjoRlHGGDxBaHRJ8amelwtS5lkBhLaQVNp5ak_XPGDT8Y79l9luDliYVTKv7zIxmpwG0IhUb4psqpOYZ8J-q0bn5jvsSyuULeHGEqc3baHaf9z_ARoQLvH3AVR96i2fcusJ1mA4efCpYEv2eub9rKkUv2NJyIaj2kiHRBvn1tn0Qb7lL3hUCTmvVUCpG6dNrxN5Trlp9O7V7pqibvRwjE0lTkVyIEX_UEUiKwIWSdjk5rsFpA&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;utm_referrer=https%3A%2F%2Fblog.anomali.com%2Fprivacy-a-cyber-report&amp;canon=https%3A%2F%2Fblog.anomali.com%2Fprivacy-a-cyber-report&amp;pageId=4400144323&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478822660171.1478831861868.179&amp;__hssc=41179005.5.1478831861868&amp;__hsfp=1335165674" id="cta_button_458120_bfe9d714-b9a1-4733-8b89-44b169eb6a53" style="margin: 20px auto;" target="_blank" title="Download Here"> Download Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, 'bd3e320b-6f5f-47ad-ae30-589597d266a4', {});</script> </span> </p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.
__wf_reserved_heredar