Ad Banner
Press Releases

Cybercriminals Recruit Insiders to Attack Telecoms Providers

The insiders most in demand

According to the Kaspersky Lab researchers, if an attack on a cellular service provider is planned, criminals will seek out employees who can provide fast track access to subscriber and company data or SIM card duplication/illegal reissuing.

If the target is an Internet service provider, the attackers will try to identify those who can enable network mapping and man-in-the-middle attacks.

However, insider threats can take all forms. The Kaspersky Lab researchers noted two non-typical examples, one of which involved a rogue telecoms employee leaking 70 million prison inmate calls, many of which breached client-attorney privilege. In another example, an SMS center support engineer was spotted on a popular DarkNet forum advertising their ability to intercept messages containing OTP (One-Time Passwords) for the two-step authentication required to login to customer accounts at a popular fintech company.

“The human factor is often the weakest link in corporate IT security. Technology alone is rarely enough to completely protect the organization in world where attackers don’t hesitate to exploit insider vulnerability. Companies can start by looking at themselves the way an attacker would. If vacancies carrying your company name, or some of your data, start appearing on underground message boards, then somebody, somewhere has you in their sights. And the sooner you know about it the better you can prepare,” said Denis Gorchakov, security expert, Kaspersky Lab.

In order to protect the organization from insider threat, Kaspersky Lab advises the following:

● Educate your staff about responsible cyber-security behavior and the dangers to look out for, and introduce robust policies about the use of corporate email addresses;

● Use Threat Intelligence Services to understand why cybercriminals might be looking at your company and to find out if someone is offering an insider “service” in your organization;

● Restrict access to the most sensitive information and systems;

● Do a regular security audit of the company’s IT infrastructure.

Read more about insiders and other typical cyber-threats facing telecommunications companies on Securelist.