Data Security

Enterprise Lessons from Anonymous' World Cup Threat

Enterprise Lessons from Anonymous
June 3, 2014 10:29AM

Bookmark and Share
Anonymous is taking on the World Cup, threatening to launch cyberattacks on its sponsors. To deal with Anonymous' threats, World Cup sponsors and all businesses need to take a gaming frame of mind when they build their cybersecurity practices -- it's about the game play, not the technology, said TK Keanini, CTO of network security firm Lancope.

APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.

Anonymous isn’t making as many news headlines this year as it did in years past, but the hactivist organization is alive and well -- and making threats to launch cyberattacks on sponsors of the World Cup in Brazil.

“We have a plan of attack,” a member of Anonymous who calls himself Che Commodore, told Reuters. “We have already conducted late-night tests to see which of the sites are more vulnerable . . . This time we are targeting the sponsors of the World Cup.”

Reuters admits it had no means of confirming Commodore’s identity or his affiliation with Anonymous and reports that the sponsors did not immediately respond to requests to comment on the threat. But what can enterprises learn from this global headline?

Are You Ready?

We caught up with TK Keanini, CTO of network security firm Lancope, to get his take on the Anonymous moves. Regardless of threat profile, he told us an event of this magnitude needs to have a heightened level of readiness to a physical or cybersecurity related event.

“By the time a group like this makes a public announcement, much of the infiltration phase has already been done,” Keanini said. “These threat actors are smart and they don't start to show their cards until they are well into the operational phase of their campaign.”

Keanini stressed that events like the World Cup require hundreds of interconnected businesses all of them need to be prepared. Offering the hard truth, he said if your business is connected to the Internet you should be prepared for cybersecurity events because they are likely to have already happened -- you just don't have the tools and techniques to detect them.

“When we consider the World Cup and the level of talent competing, it helps us frame the challenges many face in cybersecurity,” Keanini said. “It is not as much about the technology, as it is about the game play and talent where as soon as one side makes a mistake, it is exploited by the other team.”

A Gaming Frame of Mind

This is the same thing that happens in cybersecurity and in some cases, he said, the adversaries have an overwhelming advantage in terms of talent. His advice: businesses need to take a gaming frame of mind when they build their cybersecurity practices -- it is about the game play, not the technology.

We also asked Tom Cross, Lancope director of security research, for his take on the Anonymous news. He told us distributed denial-of-service attacks often come into play in public controversies and protests. At this point, he noted, preparation for denial-of-service attacks should be standard practice for any organization with a large, mission-critical presence on the Web.

“However, every organization with an Internet network can do their part to make sure that they don't have services running on their network that can be leveraged by attackers for traffic reflection and amplification,” Cross said. “DNS servers, NTP servers, SNMP services, voice over IP services and XML-RPC ping back services in particular should be checked to make sure that they don't provide a spring board for denial-of-service attacks.”

Tell Us What You Think
Comment:

Name:



 Data Security
1. Juniper DDoS for High-IQ Networks
2. Google Hacker Team to Hunt Bugs
3. Cloud Firms Offer Azure Starter Kit
4. FBI Cyber-Expert's Humble Start
5. Chinese Hackers Hit U.S. Officials




 Most Popular Articles
1. Review: Warming Up to Tablets with Keyboard Covers
2. Android SMS Worm Lets Bad Actors Cash In
3. Aerohive Helps Retailers Engage In-Store Customers
4. Google I/O Conference Brings a Lot for Businesses
5. Bezos: Amazon's Fire Phone Offers 'Something Different'

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Lenovo Still in Small Windows Tablets
  Schools Buy Million Chromebooks in Q2
  'TV Anywhere' Solutions from Sling
  Mobile Apps Offer Last-Minute Deals
  Nokia X Phones Had Identity Crisis

 Technology Marketplace
Big Data
Unlock your enterprise data's potential. Learn how in the research report.
Are you getting everything you can out of your business data?
 
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
CIO Issues
Secure and retain skilled technology professionals. Learn how.
 
Cloud Computing
Are you getting everything you can out of your business data?
 
Data Storage
Unlock your enterprise data's potential. Learn how in the research report.
 
Enterprise Hardware
Protect your network with APC Smart-UPS battery backup
Cisco UCS Invicta Series flash memory systems
 
Enterprise I.T.
Register for an upcoming ISACA® certification exam today
Secure and retain skilled technology professionals. Learn how.
 
Enterprise Software
Unlock your enterprise data's potential. Learn how in the research report.
 
Hardware
Protect your network with APC Smart-UPS battery backup
Ferocious productivity. A fearless team of pros. Find Out More
Cisco UCS Invicta Series flash memory systems
 
Network Security
Protect your network with APC Smart-UPS battery backup
 
Small Business
Ferocious productivity. A fearless team of pros. Find Out More