Foreign Interference Drives Record Surge in IP Theft

Hostile foreign states are behind a surge in malicious insider breaches, driving IP theft and industrial espionage to an all-time high, according to DTEX. The insider threat specialist analyzed over 1300 investigations across its global customer base to compile the 2024 i3 Insider Risk Investigations Report - Foreign Interference.
It claimed to have recorded a 70% increase in customers seeking help to protect against foreign interference since 2022, with the biggest uplift in numbers coming from the public sector and critical infrastructure organizations.
While the majority of IP theft incidents involved data exfiltration of some form, techniques varied based on the controls that customer organizations had in place.
In some cases, the suspect was observed testing these controls with innocuous data, to see if it passed through without being flagged.
Malicious insider conspiring with nation states also go to greater lengths not to trigger an alert when bypassing security controls, the report noted.
It cited the recent case of Linwei Ding, a former Google engineer who was charged with stealing IP from the tech giant.
He allegedly copied data from Google source files into Apple Notes on his corporate MacBook, and then converted them into PDFs and uploaded them to a separate personal cloud account - in order to bypass the firm's data loss prevention checks.
DTEX claimed 64% of its malicious IP theft investigations also featured some form of sophisticated data preparation, aggregation and/or conversion.
Many included the conversion of data into some form of image or PDF. Perhaps unsurprisingly, the majority also attempted to conceal their activity by using private browsers, VPNs, mobile hotspots, burner emails and encrypted messaging accounts.
Some 95% even managed to avoid using ATT&CK techniques in order to stay hidden.
DTEX claimed that, overall, 15% of employees take sensitive data with them when they leave an organization, rising to 76% of employees who take non-sensitive information.


This Cyber News was published on www.infosecurity-magazine.com. Publication date: Tue, 09 Apr 2024 14:40:04 +0000


Cyber News related to Foreign Interference Drives Record Surge in IP Theft

Foreign Interference Drives Record Surge in IP Theft - Hostile foreign states are behind a surge in malicious insider breaches, driving IP theft and industrial espionage to an all-time high, according to DTEX. The insider threat specialist analyzed over 1300 investigations across its global customer base ...
1 year ago Infosecurity-magazine.com
31 Alarming Identity Theft Statistics for 2024 - Identity theft is a prevalent issue that affects millions of people annually. Although the numbers are startling, we've selected the 31 most concerning identity theft statistics to help you understand how to secure your identity. In 2022, the FTC ...
1 year ago Pandasecurity.com
The Latest Identity Theft Methods: Essential Protection Strategies Revealed - Identity theft has evolved far beyond the days of stolen mail and dumpster diving. Today's identity thieves employ sophisticated techniques, including account takeovers and government benefit fraud, making it essential for you to stay vigilant to ...
1 year ago Hackread.com
Lawmakers: Ban TikTok to Stop Election Misinformation! Same Lawmakers: Restrict How Government Addresses Election Misinformation! - In a case being heard Monday at the Supreme Court, 45 Washington lawmakers have argued that government communications with social media sites about possible election interference misinformation are illegal. Just this week the vast majority of those ...
1 year ago Eff.org
Beijing fosters foreign influencers to spread its propaganda The Register - China is offering foreign influencers access to its vast market in return for content that sings its praises and helps to spreads Beijing's desired narratives more widely around the world, according to think tank the Australian Strategic Policy ...
1 year ago Theregister.com
Unmasking Identity Theft: Detection and Mitigation Strategies - In an increasingly digital world, the threat of identity theft looms large, making it imperative for individuals to be proactive in detecting potential breaches and implementing effective mitigation measures. This article delves into key strategies ...
1 year ago Cybersecurity-insiders.com
New TetrisPhantom hackers steal data from secure USB drives on govt systems - A new sophisticated threat tracked as 'TetrisPhantom' has been using compromised secure USB drives to target government systems in the Asia-Pacific region. Secure USB drives store files in an encrypted part of the device and are used to safely ...
1 year ago Bleepingcomputer.com Ragnar Locker
VoltSchemer attacks use wireless chargers to inject voice commands, fry phones - A team of academic researchers show that a new set of attacks called 'VoltSchemer' can inject voice commands to manipulate a smartphone's voice assistant through the magnetic field emitted by an off-the-shelf wireless charger. VoltSchemer can also be ...
1 year ago Bleepingcomputer.com
How To Correlate Web Logs And Network Indicators To Track Credential Theft - To effectively detect credential theft, organizations must collect and analyze logs from a variety of sources, including web servers, authentication systems, proxies, DNS servers, endpoint protection platforms, and network monitoring tools. Common ...
2 months ago Cybersecuritynews.com
Gamaredon's LittleDrifter USB malware spreads beyond Ukraine - A recently discovered worm that researchers call LittleDrifter has been spreading over USB drives infecting systems in multiple countries as part of a campaign from the Gamaredon state-sponsored espionage group. Malware researchers saw indications of ...
1 year ago Bleepingcomputer.com
Canada to ban the Flipper Zero to stop surge in car thefts - The Canadian government plans to ban the Flipper Zero and similar devices after tagging them as tools thieves can use to steal cars. The Flipper Zero is a portable and programmable pen-testing tool that helps experiment with and debug various ...
1 year ago Bleepingcomputer.com
Canada to ban the Flipper Zero to stop surge in car thefts - The Canadian government plans to ban the Flipper Zero and similar devices after tagging them as tools thieves can use to steal cars. The Flipper Zero is a portable and programmable pen-testing tool that helps experiment with and debug various ...
1 year ago Bleepingcomputer.com
Microsoft Breach - How Can I See This In BloodHound? - On January 25, 2024, Microsoft announced Russia's foreign intelligence service breached their corporate EntraID environment. We reviewed the information Microsoft's team provided in their post which contained details significant enough to explain ...
1 year ago Securityboulevard.com
Survey: Election Workers Feel Unprepared for Upcoming Cyberthreats - The issues of outside interference in U.S. elections and the security of the systems behind them have been talked and debate for at least a decade and promise to be at the forefront again as the country gears up for what promises to be a pivotal ...
1 year ago Securityboulevard.com
Microsoft and DOJ seized the attack infrastructure used by Russia-linked Callisto Group - Today, the United States District Court for the District of Columbia unsealed a civil action brought by Microsoft’s DCU, including its order authorizing Microsoft to seize 66 unique domains used by Star Blizzard in cyberattacks targeting Microsoft ...
8 months ago Securityaffairs.com
Splunk: AI isn't making spear phishing more effective - Despite increased concerns, AI tools won't give adversaries an advantage when it comes to sending effective phishing emails, according to new research by Splunk's Surge security research team. In a blog post Thursday, Tamara Chacon, security ...
1 year ago Techtarget.com
Estonian spy chief: ‘Hybrid schmybrid, what’s happening is attacks’ | The Record from Recorded Future News - Estonia, which was occupied by Russia during WWII — with tens of thousands of Estonian families deported to Russia, including the mother of former Prime Minister Kaja Kallas, now the European Union’s foreign policy chief — has been a vocal ...
4 months ago Therecord.media
CVE-2021-46989 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
American Intellectual Property Theft a $600 Billion Dollar Issue - American Intellectual Property theft is costing the domestic economy as much as $600 billion per year, as reported by the Associated Press, and it appears lawmakers and watchdogs have taken note. Understanding the events that have precipitated the ...
1 year ago Securityzap.com
Russia tightens cybersecurity measures as financial fraud hits record high | The Record from Recorded Future News - Earlier in March, Russian internet users faced widespread outages that regulators attributed to issues with “foreign server infrastructure.” However, local experts suggested the disruptions stemmed from Russia’s blocking of Cloudflare, a ...
2 months ago Therecord.media
400+ IPs Actively Exploiting Multiple SSRF Vulnerabilities In The Wild - Organizations should take immediate steps to ensure they are not exposed to these attacks by patching affected systems against the exploited CVEs, including CVE-2020-7796 (Zimbra Collaboration Suite), CVE-2021-22214 (GitLab CE/EE), CVE-2021-39935 ...
3 months ago Cybersecuritynews.com CVE-2020-7796
Nakasone on Cyber Command, NSA firings and the future of the ‘dual-hat’ relationship | The Record from Recorded Future News - On Wednesday, Trump signed an executive order targeting Chris Krebs, the former head of the Cybersecurity and Infrastructure Security Agency (CISA), who worked alongside Nakasone to secure the 2020 election from foreign interference. Nakasone ...
2 months ago Therecord.media
Kremlin accuses US of plotting election-day cyberattack The Register - The Kremlin has accused the United States of meddling in Russia's upcoming presidential election, and even accused Uncle Sam of planning a cyberattack on the country's online voting system. The snoops did not provide any proof to support these ...
1 year ago Go.theregister.com
Identity Theft Surges as Criminals Deploy Advanced Tactics to Steal Personal Data - The U.S. Government Accountability Office estimates that synthetic identity fraud cost financial institutions $20 billion in 2024, up from $6 billion in 2016. Synthetic identity fraud, which combines stolen Social Security numbers with fabricated ...
1 month ago Cybersecuritynews.com
Congress Should Give Up on Unconstitutional TikTok Bans - TAKE ACTION. TELL CONGRESS: DON'T BAN TIKTOK. As a first step, H.R. 7521 would force TikTok to find a new owner that is not based in a foreign adversarial country within the next 180 days or be banned until it does so. If deemed a national security ...
1 year ago Eff.org