Insights
We take a detailed look at some scary cyber security stories that could haunt you on Halloween
With ghouls, ghosts, and witches roaming the streets, Halloween is the time for light-hearted horror stories. But there are many other horror stories that are far more disturbing: horror stories about charities and other organisations that fall victim to cyber criminals. And the reason they are disturbing? Because, like the best ghost stories, they are true.
Cyber security breaches are, in fact, almost inevitable for charities of all sizes. In the seven months from March to October 2020, nearly 700 charities fell victim to fraud or cybercrime, amounting to £3.6 million in total losses, according to the Charity Commission.
And in total just over a quarter (26%) of charities admitted that they had suffered a security breach in the past year, according to the Cyber Security Breaches Survey published by the Department for Digital, Culture, Media and Sport.
In this article, we will look at some of the scariest recent cyber security horror stories and offer some advice about how you can stay safe and secure.
One cyber crime horror story relates to Blackbaud, the South Carolina-based software company that offers software services such as its cloud-based Raiser’s Edge fundraising application to charities.
When cyber criminals broke into Blackbaud’s systems, the outcome created some issues. That’s because if cyber criminals break into a charity’s computer network, there’s a chance that that charity’s data will be compromised.
But when cyber criminals break into a cloud-based service, there’s a good chance that many, or even all, of its customers’ data will be compromised.
And that’s what transpired at Blackbaud. More than one hundred UK charities including the National Trust, Crisis, and Sue Ryder reported security incidents to the Charity Commission as a result of the Blackbaud breach.
The incident highlights the fact that nothing is 100% secure. Charities are often told that cloud service providers have more staff and resources dedicated to security than a charity could possibly afford, so they are likely to be more secure. While this is undoubtedly true, what’s clear is that they does not guarantee perfect security.
Many charities have severely limited resources to devote to cyber security, but even large commercial organisations with sizable security budgets are highly vulnerable to ransomware attacks.
Take the case of Colonial Pipeline, a billion-dollar American oil transport company that carries petrol and jet fuel around the south-eastern United States. In May 2021, the company suffered a ransomware attack which infected systems used to manage its pipeline, bringing its fuel network to a standstill.
The company felt it had no choice but to pay a 75 Bitcoin ransom (worth almost $4.5 million) to get its pipeline network up and running again.
Cyber criminals like to target large organizations with ransomware because they have the resources to pay sizable ransoms. But that’s not to say that smaller organisations and charities are not susceptible to this type of cyber crime.
For example, in June 2021 the Salvation Army in the UK suffered a ransomware attack which also resulted in some of the charity’s data being stolen by the criminals responsible for the attack. The charity did not reveal how much data was lost or whether a ransom was paid.
What’s scary about the attack is its two-pronged nature. Ransomware which encrypts data can be devastating to an organisation, although when backups are available the victim may be able to recover from the attack relatively quickly.
But when cyber criminals also steal data during the attack, it can cause much greater damage, including remediation costs, than the disruption caused by losing access to data for a short period.
The good news for charities is that many cyber security insurance policies now include cover for ransomware incidents. In 94% of cases where an organization pays a ransom, its cyber security insurance covers the cost, according to security company Sophos.
Earlier in 2021 the US arm of T-Mobile, the cellular network operator, suffered a breach in its software which allowed cyber criminals to execute ‘SIM swap’ attacks on customers. What this means is the criminals were able to reassign mobile phone numbers to SIMS that they possessed.
This is a security nightmare for those customers that were affected, for a very simple reason. Security conscious organizations beef up their password security by using two-factor authentication, and this often involves a one-time security code which is sent to a user by text message.
By carrying out SIM swap attacks, the cyber criminals were able to receive and read all of their victims’ text messages, including the one time security codes needed to log on to secure online accounts for things like online banking and cloud-based software services.
No organisation can ever be completely secure, because new cyber security threats and vulnerabilities are discovered every week.
But if you want to do minimise the risk of a cyber security nightmare this Halloween, be sure to check out our guide on how to do cyber security the right way.
Our courses aim, in just three hours, to enhance soft skills and hard skills, boost your knowledge of finance and artificial intelligence, and supercharge your digital capabilities. Check out some of the incredible options by clicking here.