Cyber Attacks Are America’s Top Security Threat Right Now. Here’s Why.

cyber theft

The biggest security threat to America and her interests right now is cyber warfare.

This warning is from Joseph Maguire, Acting Director of National Intelligence (DNI). He made the statement during a House Intelligence Committee open hearing about U.S. election security on September 26. By all accounts, the DNI's comment is right on the money. Cyber attacks and espionage have increased in scale, bringing forth an audacity in attacks no one has ever seen before.

Cyber War Against the U.S.

America is fighting a war in the digital realm, against other countries that wish to see our great nation fall. Let's take a look at some of the threats for this year:

January 2019

March 2019

  • Chinese hackers targeted 27 American universities to steal naval technology research.

July 2019

  • A warning was issued by the U.S. Coast Guard after a merchant ship reported that malware got into their network while in international waters.
  • Microsoft detected roughly 800 cyberattacks targeting NGOs, political organizations, and think tanks globally. The majority of attacks originated in Iran, North Korea, and Russia.

August 2019

  • Government-sponsored Chinese hackers ran a spear-phishing campaign on the employees of three U.S. utility companies.
  • State-sponsored hackers from China targeted various U.S. cancer institutes to steal information on advanced cancer research.

Cyberattacks and espionage cost the U.S. and the global economy billions. Let's take a look at some facts and stats:

  • In 2016, 95% of cyber attacks and data breaches centered on only three sectors: government, retail, and technology.
  • Security professionals estimate that there will be 200 billion IoT (internet of things) devices connected to the web by 2020. IoT devices are vulnerable and a favorite target for hackers who want to compromise a network.
  • This year alone, there have been ten large scale breaches in the healthcare sector, compromising millions of patients. A staggering 75% of the healthcare industry got infected with malware over the past year.
  • Experts project that cyber breaches will cost the global economy $2 trillion (yes with a T) by 2019.

Attacks Meant to Cripple and Steal.

data

As you can see from the numbers above, the favorite targets are government, retail, healthcare, and technology. State-sponsored hackers from rival countries target government agencies and third-party vendors. They hope to steal confidential intelligence or at the very least, disrupt operations. Hacking groups who do it for profit breach the retail, tech, and healthcare sectors to steal personal user information they can use or sell.

The breaches this year alone have been significant:

The Customs and Border Protection (CBP) Contractor Hack

Tennessee based surveillance CBP contractor Perceptics suffered a massive data breach last May. Hackers were able to steal about 100,000 license plates and related photos of travelers. The company stated that they also lost detailed information about their hardware and CBP protocols at various U.S. ports of entry. The stolen data found its way to the dark web only days later.

This breach is critical and should be considered a national security threat. The CBP has been ramping up border surveillance technology for the past two decades. By 2021, the agency wants facial recognition scans to be standard in all major airports in the U.S., which carries significant risks. If the agency cannot secure sensitive information, the lives of millions of people will be in danger.

As for Perceptics, the CBP suspended the company from federal contracting work after the attack, though they didn't say why.

Related Post: https://www.thesmartconsumer.com/hackers-self-driving-cars

The Rise of Ransomware

Although ransomware attacks have been around for a while, 2019 is looking like their breakout year. Cybercriminals target local governments, small businesses, and even health care providers. The scammers use malware to encrypt system data and demand ransom to decrypt it. Manufacturing and industrial firms are also targets.

For instance, hackers can disrupt operations by forcing production plants to use manual control. For now, only financially motivated cybercriminals use ransomware attacks. The world will be a scarier place if state-sponsored hackers use this platform.

Attacks on the Supply Chain

Supply chain attacks involve compromising a target's software updating tool to spread malware to users. What seems like a legitimate software vendor update is actually destructive malware in disguise. In March, computer manufacturer Asus disclosed an attack in 2018 that compromised its Live Update tool.

The computer maker said that the tool pushed malware to almost a million customers. The hackers signed the compromised update with a real Asus certificate to bypass detection. It was the same tactic used on popular PC cleanup tool CCleaner and Microsoft's Visual Studio.

American Medical Collection Agency Hack

Another major breach this year involves the American Medical Collection Agency (AMCA). AMCA is a debt collection agency that specializes in healthcare. Hackers were able to sneak into their systems for about eight months, from August 2018 to March 2019. The data breach was first reported in early June. Medical testing company LabCorp stated that 7.7 million customer data got exposed due to AMCA.

Compromised records from Quest Diagnostics amount to around 12 million. The stolen information included first and last names, birthdays, addresses, phone numbers, healthcare providers, and even dates of medical services. The company operating AMCA filed for chapter 11 bankruptcy protection because of the breach.

Winning the Cyber War Starts with You

data security

Winning the country's cyberwar starts with not becoming a victim. You won't be doing anybody favors if your PC becomes a zombie botnet automatically infecting other devices. Here are a few necessary steps to keep yourself safe:

  • Never open email attachments or click on links from an unknown sender. When in doubt, perform a reverse email search on the sender.
  • Protect yourself at all times by securing your network with a unique and robust password not shared with anyone.
  • Never use the same password twice and make sure to follow these steps on how to create strong passwords.
  • Secure all your devices with an antivirus program from a reputable company.

Remember, safety starts with you!