What Cyber Criminals Are Looking For

Looking back over the past 25 years of threat detection and mitigation, the cyber security industry

has evolved from malicious intentions to ruin files and backups to more organized targeted attacks.

More specifically, some threats are organized by politically motivated groups who issue denial of

service attacks with the intention of shutting down web sites. An example of such an attack was performed

on the Nasdaq web site on February 14th, 2012 (i.e. Valentines Day). The intent to shut down

these sites is often to prevent a company from doing business. Other attacks are designed to steal either

intellectual property or actual money from online bank accounts. You may want to ask yourself:

who is being targeted the most?

“I am convinced that every company in every conceivable industry with significant size and valuable intellectual property and trade

secrets has been compromised (or will be shortly), with the great majority of the victims rarely discovering the intrusion or its impact.

In fact, I divide the entire set of Fortune Global 2,000 firms into two categories: those that know they’ve been compromised and those

that don’t yet know.”  said  Dmitri Alperovitch, former VP of Threat Research, McAfee®

Companies less concerned about their bank accounts being tapped should consider the much larger

implications of their intellectual property being stolen. Alperovitch went on to say:

“What is happening to all this data … is still largely an open question. However, if even a fraction

of it is used to build better competing products or beat a competitor at a key negotiation

(due to having stolen the other team’s playbook), the loss represents a massive economic


In the worst case scenario, the cyber criminals are looking for your company’s assets. If they cannot

compete in your industry the old fashion way, they will take what you spent so much money on to

build: your intellectual property. They want your customer lists, your engineering designs, future

marketing plans, the names of your best employees–they intend to use all of it against your company.

How much would you pay to learn all this about your closest competitor?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Namtek or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Namtek shall not be liable for any damages whatsoever arising out of the content or use of this blog.
%d bloggers like this: