The Biggest Cyber Attack Of 2020 Has ‘Already Happened’

The biggest cyberattack of 2020 has “already happened”, according to Amanda Finch,  CEO of the Chartered Institute of Information Security (CIISec). 

Her words are a wake-up call to organizations to take pre-emptive action against future, and potentially catastrophic, cybersecurity breaches.  The vulnerabilities that will underscore next year’s landmark breaches are most likely already in place.

Security-breach news became so common in 2019 that readers' eyes often glazed over at the headlines. Cybercrime-as-a-service (CAAS) is poised to become a significant cyber attack trend  in 2020. Ransomware and phishing, as in 2018, were out of control; state-run hackers were working around the clock and making money; passwords were leaked; sophisticated malware attacks kept spreading; data was breached. 

Following the first full year of the General Data Protection Regulation (GDPR), a set of international rules set by the European Union in May 2018, governments around the world are beginning to implement coherent data privacy rules, 

Future Attacks
“Cyberattacks do not happen in an instant,” Amanda Finch told TechHQ. “From the initial breach to detecting the attack, to eventual resolution, reporting and any action by regulators can take months or even years. “As such, the biggest attack of 2020, that will affect the most people, cause the greatest reaction in the industry, and result in the greatest damage to the organisation, has almost certainly already happened.”  Finch added that the hypothetical breach is “most likely a skeleton waiting to emerge from an unknowing organisation’s closet.”

Breaches in the Making
The statement serves as a reminder that most breaches can be traced back to human error and a lack of robust policies throughout an organisation, despite the security measures the business might have in place. Meanwhile, attackers often enter systems months in advance, remaining undetected, making proactive threat-hunting missions a necessarily vital part of an organisation’s defense. 2019 has seen no shortage of headline-grabbing data breaches. Perhaps one of the most damaging to a brand was that of Capital One, whose server breach exposed personal information belonging to some 106 million of the bank’s customers and applicants in the US and Canada. Among the personal data exposed were names, addresses, dates of birth, credit scores, transaction data, Social Security numbers, and linked bank account numbers.  

This year has also seen a surge in US ransomware. The attacks, which have taken place across cities in US states, such as New York, Florida, Texas and Maryland have disabled vital city infrastructure and communications, the pace of attacks exacerbated throughout the year, attackers likely heartened by some victims’ willingness to hand over the multimillion-dollar payouts demanded. 

Meanwhile, Norwegian manufacturing giant Hydro was one among severl other firms struck by Lockergoga malware. Likely stemming from a misjudged email link click, the entire business was brought offline across 22,000 computers within 170 sites across 40 countries worldwide. 

With cyberattacks continuing to prove fruitful, and methods of hackers ever more sophisticated, 2020 will inevitably witness its fair share of high-profile breaches unfolding. 

“To avoid becoming this victim, organisations need to be sure they can both prevent attacks, and identify the signs of a breach so they can mitigate any damage,” said Finch. 

Cyberattacks can carry an extraordinary level of damage to a business, to reputation and customer trust, and the cost of reparations and down-time. Businesses may be tempted to invest in brimming cybersecurity armories, most businesses have 50 defense tools in place at one time, according to Ovum, an “enormous” part of infosec management comes down to people, Finch said. 

“Organisations must have the right people, with the right skills, occupying the right roles....Investing in equipping staff with the best training, not only in the security team but across the whole organisation, will also be critical in defending against attacks. Ultimately, organisations can either prepare for the worst now or learn a very expensive lesson later.” 

Even if a business falls victim to an attack,  proving that thorough mitigation efforts were taken can reduce the various impacts of a breach. 

 According to a survey of M&A experts by (ISC²), while 86 percent said a publicly reported breach would detract from an organisation’s valuation, a previous breach is not a deal-breaker if the company can demonstrate it acted with the correct procedure at the time.

CIISec:          TechHQ:         eWeek:    

You  Might Also Read:

Creating A Cyber Incident Response Policy

2020 Cyber Attack Predictions:

 

« Insiders Are Cyber Criminals Favourite Connection
AI Market Forecast To Be Worth $190b By 2025 »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

Sandia National Laboratories

Sandia National Laboratories

Sandia National Laboratories is a premier science and engineering lab for national security and technology innovation.

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

Redbelt Security

Redbelt Security

Redbelt is a cyber security consultancy. We integrate people, systems, services and products to transform how your information security is delivered.

Conference Index

Conference Index

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across a wide range of subjects including Cybersecurity.

Adzuna

Adzuna

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

Barquin Solutions

Barquin Solutions

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners.

Soteria LLC

Soteria LLC

Soteria LLC are a client-focused organization providing expert advisory, consulting services, and tailored solutions to prevent, detect, and respond to cybersecurity incidents.