Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Insider Threat Incidents Increasing at Businesses, Warns IC3

The FBI’s Internet Crime Complaint Center (IC3) is advising companies to take a look inside as they consider security threats.

The FBI’s Internet Crime Complaint Center (IC3) is advising companies to take a look inside as they consider security threats.

According to IC3, a recent review of FBI cyber-investigations revealed victimized businesses suffer significant losses due to cyber-incidents involving disgruntled or former employees. The losses in the incidents ranged from $5,000 to $3 million, with factors such as the value of stolen data to legal fees impacting the cost.

“There has been an increase in computer network exploitation and disruption by disgruntled and/or former employees,” the advisory states. “The FBI and DHS assess that disgruntled and former employees pose a significant cyber threat to US businesses due to their authorized access to sensitive information and the networks businesses rely on.”

“The theft of proprietary information in many of these incidents was facilitated through the use of cloud storage Web sites, like Dropbox, and personal e-mail accounts,” according to the advisory. “In many cases, terminated employees had continued access to the computer networks through the installation of unauthorized remote desktop protocol software. The installation of this software occurred prior to leaving the company.”

In addition, the advisory warns, multiple incidents were reported in which disgruntled or former employees attempted to extort their employer for financial gain by modifying and restricting access to company Web sites or disabling content management system functions or launching distributed denial-of-service attacks.

Advertisement. Scroll to continue reading.

Most often, data theft within organizations is linked to employees and others with legitimate access to systems, networks and sensitive data, said Armond Caglar, senior threat specialist at TSC Advantage. This can be the result of inadvertent behaviors due to human error and a lack of policies or a deliberate breach done maliciously.

“From a hiring perspective, comprehensive background checks and due diligence can help reveal a pre-hire’s connection to any potential competitive intelligence adversaries,” he said. “For example, organizations, especially those looking to make an international hire, should analyze the relationships of employees and partners to determine potential risks to the organization’s intellectual assets.”

“Additionally, IT and security leaders tend to focus on technology solutions to protect a company’s digital perimeter and data from outsiders, but often overlook essential training and procedures, such as insider threat anomaly detection, that can help spot threats from trusted insiders,” he added.

IC3 recommends organizations perform a regular review of employee access and terminate accounts that individuals don’t need to perform their daily duties on the job. Likewise, companies should terminate accounts associated with former employees or contractors no longer working there and change administrative passwords to servers and networks following the release of IT personnel.

Other suggestions include not sharing RDP usernames and passwords and preventing employees from downloading unauthorized remote login applications on corporate computers.

“An enterprise can shore up its external defenses and believe it is protected, but all it takes is one employee circumventing the system to cause an issue,” said Ryan Kalember, chief product officer at WatchDox.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.