TalkTalk Hack Revisted

Now the dust has settled from the TalkTalk hack, what can be learnt to help other companies prevent a similar situation?

The impact of the hack on TalkTalk was rapid and dramatic; in one day its share price fell by 12% and in total an estimated £360 million was wiped off it’s value (stock value pictured). The direct one-off cost of dealing with the hack was reportedly more than £30 million.

A number of the alleged hackers have been arrested and it appears that rather than organised criminals or nation-state actors this hack was perpetrated by a group of teenagers ranging in age from 15 to 20.
 
Without belittling the skill of the teenagers, it is safe to say that of "threat actors" that concern corporations and governments, mischievous teenagers should sit somewhere near the bottom of the risk scale. The fact they appear to have been caught shows their lower level of expertise, and sets this hack apart from other notable cyber intrusions; such as Sony where it is still hotly debated who did it, let alone whether they will be brought to justice. Despite this, the hack showed just how much damage even a relatively unsophisticated group of hackers can still have on a company.

The publicity surrounding the hack was bad for TalkTalk’s share price, but at least TalkTalk identified they had been breached at all. One study found that in 2014 it took up to 205 days for most companies to discover a breach.

The same study also found that typically it takes hackers seconds to breach a system and only minutes to exfiltrate the data they are interested in. More often than not the public never knows about the many cyber intrusions that occur, making understanding the scale of the problem even more difficult.

In the Talktalk case the attackers reportedly used a simple vulnerability in the company website to launch what is known as a blind SQL injection attack; a way of querying and breaching the database sitting behind a website. This should not have been a difficult vulnerability to identify and fix. This was made worse by bad security procedures by TalkTalk; the creditials for one admin were found to be username: tim, password: tim.

The Teenagers in question are unlikely to have had a wider strategy for using, passing-on and profiting from the information they stole, which would undoubtedly already happened if the hack was carried out by an organised criminal group. A number of the hackers involved have already stated that it was actually done for “shits and giggles”.

This should give TalkTalk’s shareholders something to be happy about and the impact on customers and the data stolen is likely to be much lower than first suspected. In general the more public the hack, the easier it is to find what information has been stolen and easier to mitigate against any disclosure.

Suffering three public hacks in the space of a year makes it clear that TalkTalk is doing something wrong when it comes to cyber security. The latest hack was not a complex or difficult problem to fix and should have been identified if the company was employing ethical hackers and penetration testers.

There are extensive lists of procedures that can be put in place to increase cyber security, all which take money and staff. Ethical hacking is usually at the very end of most lists, and as one of the most expensive to be implemented it is often not done, this is a problem because it is potentially the most important to carry out. Without skilled professionals testing a network and system just like the real hackers would there is no way of knowing what holes there are left in your security infrastructure.

As Talktalk found the money spent trying to mitigate a cyber attack is vastly more than putting in effective procedures before it happens. The irony is that even if millions are spent on the highest level of cyber security it still does not guarantee that all attacks will be stopped. A good cyber security infrastructure will stop many attacks, including the one Talktalk was victim to but sadly complete security can never be guaranteed. Knowing this and preparing for what to do when breach does occur is another useful part of a complete cyber security strategy.

Max Vetter is a consultant, trainer, investigator and ethical hacker specialising in Cyber Security and the Dark Web

http://maxrvetter.com/

« Islamic State Launches A Cyber War Magazine
Ukrainian Power Grid Hack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

CyberX9

CyberX9

CyberX9 helps you protect against a wide range of cyber attacks whether you are a business or a high-net worth individual under risk.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

QPoint Technologies

QPoint Technologies

QPoint provides solutions and consulting in areas including software engineering, testing, cybersecurity, ICT, web, mobile, project management, and complex integration processes.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Sonar

Sonar

AI generated or written by humans, Sonar’s Clean Code Solutions cover your code quality needs, improving code reliability, maintainability, and security.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

Kerberus Cyber Security

Kerberus Cyber Security

Kerberus Cyber Security (formerly MintDefense) is a leading innovator in Web3 user security, dedicated to safeguarding digital assets and transactions through its flagship product, Sentinel3.