Business Daily Media

Men's Weekly

.

attack on BBC and BA offers glimpse into the future of cybercrime

  • Written by Danny Steed, Lecturer in Cyber Security, Cranfield University
attack on BBC and BA offers glimpse into the future of cybercrime

British Airways (BA), the BBC, Ofcom and Boots were among a number of organisations that were reportedly victims of a major recent cyber-attack[1], resulting in the breach of numerous staff details.

The stolen data is said to include staff names, staff ID numbers and national insurance numbers (although, importantly, not banking details). But, other than for those personally affected, the real issue is what this attack reveals about the evolution of cybercrime.

More cybercriminals are realising that if they can compromise a trusted supplier, this will lead to the compromise of that organisation’s customers. The hackers can then steal the data and potentially hold both individuals and companies to ransom.

So far, this has proven a more difficult way to make a lot of money. But it’s arguably only a matter of time.

The recent attack[2] was against a piece of software called Moveit[3], which is used to transfer computer files from one location to another. It involved what’s called a “zero-day exploit[4]”, a piece of computer code that takes advantage of a previously unknown vulnerability.

This allowed hackers to compromise Zellis, a trusted supplier of services to BA, the BBC, Boots and others. Zellis confirmed a “small number” of customers had been affected[5], adding that it had disconnected the server using Moveit as soon as it became aware of the incident.

Since Zellis is the main payroll service provider to these organisations, it is easy to trace how this incident started. Responsibility for the attack was claimed by the Russia-linked “cl0p” group, which has since issued an ultimatum to the affected organisations – asking for money unless they want the stolen data to be released on the dark web[6].

Future of cybercrime

Unlike many previous types of attack, particularly those that have employed ransomware[7], in this case the criminal group launched a mass attack and waited for individual organisations to fall prey, then sought to exploit each one in turn.

This suggests these cybercriminals have learned from previous supply-chain attacks[8], and are experimenting with making the strategy commercially viable. In supply-chain attacks, cybercriminals target one organisation by attacking an external provider they use.

BBC New Broadcasting House in London.
The BBC was among the organisations successfully hacked. Nigel J. Harris / Shutterstock[9]

Groups such as cl0p appear to have watched and learned, especially from the SolarWinds attack of late 2020[10], where the system for “patching” – doing quick repairs of – a near-ubiquitous software tool was compromised.

This software was widely used across the US government and industry, leading to tens of thousands of SolarWinds clients falling victim, including the Department of Defense, Nasa, TimeWarner and AT&T. Attributed to Russia’s military intelligence agency the GRU, SolarWinds was seen as being mainly motivated by state espionage.

And in the case of Moveit, the cl0p group appears to have taken the logic of supply-chain attacks – which proved so effective against SolarWinds – and wielded it against corporate targets.

Evolutionary step

This was arguably always going to be an evolutionary step for cybercriminals. First, sophisticated state-sponsored hackers verify an innovative method of attacking computers, as in the case of SolarWinds. Later, criminal copycats such as cl0p apply the same strategy, avoiding the pain of inventing new methods.

The ultimatum issued by cl0p is also revealing about the behaviour and motivation of cybercriminals. It is a strange pivot from traditional ransomware campaigns, where the victims’ payment details were stolen.

In the case of Moveit, it is instructive that cl0p has issued a public ultimatum[11], telling victim organisations to get in touch unless they want their data to be released into the wild – allowing its exploitation by scammers, fraudsters and other criminals.

British Airways flight.
The organisations involved, including BA, were using Zellis for payroll services. Jarek Kilian / Shutterstock[12]

Effectively, cl0p is relying on a panic tactic to get organisations to take responsibility for the stolen data and protect their staff’s identities, by volunteering themselves to the criminals for negotiation – presumably on the topic of payment.

This reveals a clear lack of resource – outside the technical “attack teams” – on the part of cl0p to fully exploit its apparent success in compromising Moveit.

This is a potential flaw in the behaviour of such criminal groups. It shows that a move from ransomware-driven campaigns to supply-chain attacks is more difficult to monetise.

The final step in maximising the return from the attack, by making all the victims pay, is clearly harder than with simple ransomware, where the focus is on one target organisation and one route to the pay-out from the crime.

In short, cybercriminal groups have copied the supply-chain attack strategy and are now experimenting with it. But they are struggling to fully exploit and monetise the successes they have with it.

Where ransomware has been the campaign of choice for more than half a decade, we should, however, be concerned that the Moveit attack signals a change of strategy. Supply-chain attacks are effective, and the criminals are now working to refine their methods in order to fully exploit them. As such, it’s very likely that these attacks will only become more widespread.

References

  1. ^ victims of a major recent cyber-attack (www.bbc.co.uk)
  2. ^ The recent attack (www.cisa.gov)
  3. ^ Moveit (en.wikipedia.org)
  4. ^ zero-day exploit (www.intel.co.uk)
  5. ^ “small number” of customers had been affected (www.zellis.com)
  6. ^ dark web (theconversation.com)
  7. ^ ransomware (theconversation.com)
  8. ^ supply-chain attacks (www.ncsc.gov.uk)
  9. ^ Nigel J. Harris / Shutterstock (www.shutterstock.com)
  10. ^ SolarWinds attack of late 2020 (www.npr.org)
  11. ^ issued a public ultimatum (www.lbc.co.uk)
  12. ^ Jarek Kilian / Shutterstock (www.shutterstock.com)

Read more https://theconversation.com/moveit-hack-attack-on-bbc-and-ba-offers-glimpse-into-the-future-of-cybercrime-207670

Demand for Home Batteries surges as Federal Rebate Kicks In

A leading provider of energy solutions VoltX Energy has seen a 400% increase in demand for home batteries in the past three weeks as people put d...

Why Sport Remains the Safest Bet in an Uncertain World

When Rome was in crisis, its leaders did not retreat to the Senate. They went to the circus. To the chariot races. To the gladiators. Sport was no...

THE FINE LINE WITHIN HILARIOUS SIGNAGE DESIGN FAILS

It seems like design failures still occur in today’s modern branding era, despite rigorous rounds of approvals behind the scenes. One signage show...

Deputy Announces Exclusive Global Partnership with Predelo to Bring AI to Shift-Based Businesses

Deputy, the global people platform for shift-based businesses, has announced an exclusive partnership with Predelo, an AI Decision Agent-as-a-Serv...

Leftover Budget? The Last-Minute EOFY Tip to Drive Business Success in FY25/26

The countdown is on. With just days left until EOFY, now’s the time to make your remaining 2024–2025 budget work harder and smarter. After workin...

pay.com.au appoints new CEO and Managing Director

The former COO will lead the company’s next growth phase, with ex-CEO Edward Alder transitioning into the role of Managing Director AUSTRALIA, 25...

Sell by LayBy