Security Technology Executive

NOV-DEC 2017

Issue link: https://securitytechnologyexecutive.epubxp.com/i/917121

Contents of this Issue

Navigation

Page 40 of 71

of drones being used in previous attacks in the U.S. or Europe, but due to the proliferation of drone technol- ogy, we believe it will happen. Security directors and executive protection teams will have to take efforts to detect drone activity attempting to surveil their personnel and facilities. 4 Improved, More Targeted Ransomware While widespread ransomware attacks such as WannaCry and NotPetaya are creating a great deal of publicity, they have not generated much revenue for their authors. Indeed, despite infecting hundreds of thousands of computers across the globe, WannaCry only netted some $130,000. By comparison, highly, tailored ransomware attacks against the properly selected single target have proved to be far more lucrative. For example, South Korean web hosting company Nayana was hit with a spear phishing campaign using Erebus ransomware in June that led the company to pay $1 million to unlock the 153 servers impacted by the attack. The Canadian cybersecurity and digital foren- sics company Cytelligence paid $425,000 to attack- ers after its production databases and backups were encrypted following a spear-phishing attack that targeted six of the company's executives. Targeted attacks are also less likely to be pub- licized and therefore not as quickly remedied as we saw with WannaCry. A large- scale ransomware attack can attract everyone's attention within hours because of its pervasiveness. It might take weeks or months to detect ransomware behind more discre- tionary attacks. Criminals learn from the successes of other crimi- nals, and we should expect to see an increase in the number of targeted ransomware attacks due to the large quantity of money extorted from Nayana and Cytelligence. 5 The Use of HUMINT to Facilitate Cyber Attacks It is important to recognize that not all cyber threats are external. Indeed, some studies sug - gest that some 75 percent of cyber threats involve insiders. A substantial percentage of the attacks involving insiders are cases where the employee is unwitting, such as those involving phishing or social engineering. However, there is also a significant threat posed by knowing insiders. Cases in which an employee is recruited by a business competitor and takes intellectual property as they exit, have been well documented, but security managers also need to worry about internal actors who stay in place and serve as a persistent cyber threat. Whether recruited using money, sex or some other approach, the persistent insider threat can prove far more damaging than the loss suffered by a one-time data dump. As I often note to security directors during presentations on this topic, "if I run Anna Chapman at the guys in your IT department, I will own your system." About the Author: Scott Stewart is v ice president of tactical analysis for Stratfor Threat Lens, a product that helps securit y leaders identif y, anticipate, measure and mitigate risks that emerging threats pose to their people, assets and interests around the globe. Statement of Ownership, Management, and Circulation (Requester Publications Only) 1. Publication Title 2. Publication No. 3. Filing Date-Revised Sec urity Technology Executive 009-826 4. Issue Frequency 5. No. of Issues Published Annually 6. Annual Subscription Price Feb/Mar, May/Jun, Jul/Aug, Sept/Oct, Nov/Dec 5 Free to Qualified Subscirbers 7. Complete Mailing Address of Known Office of Publication (Street, City, County, State, and Zip+4) Contact Person SouthComm Business Media, LLC. Ella Dean 1233 Janesville Ave Fort Atkinson, WI 53538 Telephone (920) 563-1631 8. Complete Mailing Address of Headquarters or General Business Office of Publisher SouthComm Business Media, LLC; 1233 Janesville Ave; Fort Atkinson, WI 53538 9. Full Names and Complete Mailing Addresses of Publisher, Editor, and Managing Editor Publisher (Name and Complete Mailing Address) Nancy Levenson-Brokamp, Group Publisher 1233 J anes v ille Avenue Fort Atkinson, WI 53538 Editor (Name and Complete Mailing Address) Steven Lasky, Editorial Director/Editor-in-Chief 1233 J anes v ille Avenue Fort Atkinson, WI 53538 Managing Editor (Name and Complete Mailing Address) J oel Griffin 1233 J anes v ille Av enue Fort Atkins on, WI 53538 10. Owner (Do not leave blank. If the publication is owned by a corporation, give the name and address of the corporation immediately followed by the names and addresses of all stockholders owning or holding 1 percent or more of the total amount of stock. If not owned by a corporation, give the names and addresses of the individual owners. If owned by a partnership or other unincorporated firm, give its name and address as well as those of each individual owner. If the publication is published by a nonprofit organization, give its name and address.) Full Name Complete Mailing Address SouthComm Business Media, LLC 1233 J anes v ille Avenue, Fort Atkinson WI 53538 11. Known Bondholders, Mortgagees, and Other Security Holders Owning or Holding 1 Percent or more of Total Amount of Bonds, Mortgages or Other Securities. If none, check here. None Full Name Complete Mailing Address City Paper, LLC 1233 Janesville Avenue, Fort Atkinson WI 53538 Dec ision Media, Inc 1233 J anes ville Avenue, Fort Atkinson WI 53538 Chris Ferrell 1233 J anesville Avenue, Fort Atkinson WI 53538 North American Equity Investors, Inc. 1233 Janesville Avenue, Fort Atkinson WI 53538 Tom Schiff 1233 J anesville Avenue, Fort Atkinson WI 53538 Solidus Company, L.P. 1233 Janesville Avenue, Fort Atkinson WI 53538 12. For completion by nonprofit organizations authorized to mail at nonprofit rates. The purpose, function, and nonprofit status of this organization and the exempt status for federal income tax purposes: Has Not Changed During Preceding 12 Months Has Changed During Preceding 12 Months September 15, 2017 13. Publication Title 14. Issue Date for Circulation Data Below Security Technology Executive Sept/Oct 2017 15. Extent and Nature of Circulation Average Number of Copies Number Copies of Single Each Issue During Issue Published Preceding 12 Months Nearest to Filing Date a. Total No. Copies (net press run) 23912 29106 Outside County Paid/Requested Mail Subscriptions stated on 14739 18044 (1) PS Form 3541. (Include direct written request from recipient, telemarketing and b. Legitimate Internet requests from recipient, paid subscriptions including nominal rate subscriptions, Paid and/or employer requests, advertiser's proof copies, and exchange copies.) Requested (2) In-County Paid/Requested Mail Subscriptions stated on PS 0 0 Distribution Form 3451. (Include direct written request from recipient, telemarketing and internet (By Mail requests from recipient, paid subscriptions including nominal rate subscriptions, and Outside employer requests, advertiser's proof copies, and exchange copies.) the Mail) (3) Sales Through Dealers & Carriers, Street Vendors, Counter 5 0 Sales, and Other Paid or Requested distribution Outside USPS. (4) Requested Copies Distributed by Other Mail Classes 0 0 Through the USPS. (e.g. first-Class Mail) c. Total Paid and/or Requested Circulation 14743 18044 [Sum of 15b (1), (2), (3), (4)] (1) Outside County Nonrequested Copies stated on PS form 3541. (Include Sample copies, Requests Over 3 years old, Requests induced by a Premium, 8867 10230 d. Nonrequested Bulk Sales and Requests including Association Requests, Names obtained from Distribution Business Directories, Lists, and other sources.) (By Mail (2) In-County Nonrequested Copies stated on PS form 3541. and Outside (Include Sample copies, Requests Over 3 years old, Requests induced by a Premium, 0 0 the Mail) Bulk Sales and Requests including Association Requests, Names obtained from Business Directories, Lists, and other sources.) (3) Nonrequested Copies Distributed Through the USPS by Other Classes of Mail.(e.g. First-Class Mail, Nonrequestor Copies mailed in 0 0 excess of 10% Limit mailed at Standard Mail or Package Services Rates) (4) Nonrequested Copies Distributed Outside the Mail 214 718 (Include Pickup Stands, Trade Shows, Showrooms, & other sources) e. Total Nonrequested Distribution (Sum of 15d (1), (2), and (3)) 9081 10948 f. Total Distribution (Sum of 15c and e) 23824 28992 g. Copies Not Distributed 89 109 h. Total (Sum of 15f and g) 23912 29101 i. Percent Paid and/or Requested Circulation 61.9% 62.2% (15c / 15f x 100) Average Number Copies Number of Copies of Single 16. Electronic Copy Circulation Each Issue During Issue Published If you are using PS Form 3526-R and claiming electronic copies complete below: Previous 12 Months Nearest to Filing Date a. Requested and Paid Electronic Copies 3529 3917 b. Total Requested and Paid Print Copies (Line 15C) + Requested/Paid Electronic Copies 18272 21961 c. Total Copy Distribution (Line 15F) + Requested/Paid Electronic Copies 27352 32909 d. Percent Paid and/or Requested Circulation (Both Print & Electronic Copies) 63.7% 64.5% 17. Revised Publication of Statement of Ownership for a Requester Publication is required and will be printed in the Nov/Dec 2017 issue of this publication. 18. Signature and Title of Editor, Publisher, Business Manager, or Owner Date Terri Petitt, Director, Audience Development September 15, 2017 I certify that 50% of all my distributed copies (Electronic & Print) are legitimate requests or paid copies.

Articles in this issue

Archives of this issue

view archives of Security Technology Executive - NOV-DEC 2017