Cyber criminals breaking into networks and turning them against companies

Five out of six companies have been subject to such attacks

Andrew Griffin
Tuesday 14 April 2015 06:39 EDT
Comments
The hack has already cost British losses of £20m
The hack has already cost British losses of £20m (Getty Images)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Large companies are letting hackers in and companies will inevitably be hacked, claims a new report.

Five out of six large companies were targeted by hackers, up 40 per cent from the year before, according to Symantec’s Internet Security Threat Report. And they are getting in by switching up their tactics to hijack the infrastructure of major companies and use it against them, according to the computer security firm.

“Attackers don’t need to break down the door to a company’s network when the keys are readily available,” said Kevin Haley, director, Symantec Security Response. “We’re seeing attackers trick companies into infecting themselves by Trojanising software updates to common programs and patiently waiting for their targets to download them—giving attackers unfettered access to the corporate network.”

The amount of computer vulnerabilities means that companies are taking much longer to fix them, and hackers are exploiting that delay, says the report.

Hackers have used such vulnerabilities to steal email accounts and use them to get access to sensitive information, take over computer networks and move information around before stealing it, and build special software inside their victims’ computer networks and use it to disguise what they’re doing.

Cybercriminals are then using those attacks to digitally extort their victims. As well as doing that over email, they’re also using social media, which helps attacks spread since people tend to share information with their friends — even when it is an automated tool for cybercrime.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in