Cybersecurity Journo Requests

Connect with journalists covering cybersecurity. From breaking news to in-depth features, discover relevant media opportunities from top publications in this category.

Never Miss a Cybersecurity Journo Request

Get instant alerts when Cybersecurity journalists post new journo requests. Join the community of sources landing media opportunities daily.

CISO Insights on Staff Blackmail Risks for The Stack Feature

4 key things I just learned about #cybercrime *** I enjoyed speaking to Clement Domingo at Kaspersky Horizons in Madrid. Clement is a self-taught hacker, turned consultant and incident response leader. We got into what he was seeing in incident response (for example when responding to ransomware attacks) and a few things really stood out for me. 1) Cybercrime is getting easier to do. He recently responded to an attack that had been conducted by a 15-year-old and an 18-year-old (both French) who had dropped some commodity ransomware on a QNAP NAS (storage system.) Their ransom demand? Just $8,000 – and they got it. 2) Per a story I ran yesterday (link in comments) larger cybercriminal organisations are explicitly looking to encourage this kind of “democratisation.” The FunkSec ransomware brings customisable ransom notes, encryption, local exfiltration and evasion in a single Rust binary: “plug-and-play” for script kiddies. 3) Meatspace risk/cyberspace risk are converging fast. In one incident the attacker found the details of someone at a company they decided to target in a credentials dump; got the password to his socials (he reused his password widely). In his Instagram DMs, enough nudes and other stuff to blackmail him. They threatened to release these publicly unless he shared his VPN password and voila, they were in the system. From there living-off-the-land techniques or Windows escalation-of-privileges vulnerabilities are usually enough to get an attacker what they need. (Windows EOP 0days fly about the broker marketplace, a Kaspersky researcher told me; ransomware groups love to use them.) Blackmailing someone over their Instagram DMs is not nationstate attack chain sophistication. But it works and it is getting an increasingly eclectic range of groups including teenagers hard cash (crypto) and data to sell on. I also learned: 4) These groups have exited Telegram at pace. Most communication now is over the Session messenger or one called Potato Chat. (Really). #journorequest time (#cybersecurity): I do think the risk of blackmail/threats against staff resulting in willing/unwilling insider threat is one of the areas of cybersecurity that’s not talked about enough. And (from what I can see) genuinely good guidance is a little thin on the ground. Being prepared for that is a joined up effort between HR, security and legal among other teams. For example is HR primed to respond in the right way if a staff member came to them and said they were being blackmailed for a password/access to systems? Would they know what to do and to involve security? Is there communication around this across the company? I’d like to go deeper into this for an upcoming feature in The Stack, so if you are a #CISO or someone with thoughts/experience working at this sensitive interconnection of spaces,  please do get in touch or tag a friend. Signal @Targett.11 or email ed at thestack dot technology

Never Miss a Cybersecurity Journo Request

Get instant alerts when Cybersecurity journalists post new journo requests. Join the community of sources landing media opportunities daily.