Tale from the Dark Side

Tale from the Dark Side

Penumbrous forces wait to feed on your calamity

In this autumnal month of witchery, trickery, and general tom-ghoulery, there comes a Halloween-worthy tale disturbing enough to haunt the mind of any business owner or information technology professional. It’s a curdling tale of innocence, ignorance or naivete (you be the judge) damned by unseen yet palpable presences—veritable shadow figures lurking and preying like ghosts in the machine.

As is often the case with such tales, this one’s all the more harrowing because it’s true. Or so says Stu Sjouwerman, founder and CEO of KnowBe4, a firm that specializes in Internet security awareness training, especially for smallto medium-size enterprises.

According to Sjouwerman, the unfortunate series of events began on a day much like any other at a small company that provides a subscription service to a specialized database. The company’s network consisted of 20 workstations, an SQL server, an exchange server and a dedicated website server, all linked together by a broadband connection. Normal enough for a smallish business, right? Hold that thought. This is where the story gets weird.

The company did not have a trained IT team—rather, it had one person serving part-time in an administrative role handling IT issues. This unlucky soul was going about his day, taking care of business, when he noticed something that made his spine verily tingle: For no apparent reason, the company’s webserver suddenly started experiencing much higher levels of traffic from countries where it did not even conduct business.

His flesh creeping, the part-time administrator suspected cybercriminals had broken into the company’s network. And, unfortunately, he was right.

All Tricks, No Treats

Sjouwerman says that, upon investigating the situation, it was discovered that one of the workstations had become infected with Zeus malware after an employee clicked on a link in a phishing e-mail. All the company’s servers and a number of workstations were compromised, giving cybercriminals full access to the network. The company’s logs revealed that the webserver was being used to host an illegal music download service, and also that mischievous miscreants had installed hidden rootkits.

The disinfection of the company’s network required a frightful amount of time and expense. Sjouwerman says in a press release recounting the eerie episode that his company spent 110 billable hours correcting the problems associated with the network breach, including:

  • 10 hours to select, order, configure and install a quality firewall;
  • 20 hours to build a new webserver, upload digital backups and bring it “nearline”;
  • 25 hours to scan all servers and workstations with several anti-malware tools to locate rootkits;
  • 15 hours to wipe and rebuild Windows on all workstations to ensure removal of all rootkits;
  • 10 hours to install anti-malware software on all servers and workstations;
  • 10 hours to bring the new webserver online and debug the initial problems; and
  • 20 hours to repair things that broke during the rebuild, install drivers, bring printers back online, and so forth.

At the standard rate of $90 per hour, the total cost for the technical-service cleanup was $9,900, according to Sjouwerman. On top of that, the breached company incurred loss of both revenue and productivity during the repair and rebuild: its webserver was offline for an entire day, resulting in approximately $6,600 in lost revenue; and all of the company’s 20 employees lost at least one workday during the rebuild, at an average cost of $120 per person per day, resulting in a combined productivity loss of about $2,400. Between the outside consultant fees, lost revenue and lost productivity, this single network breach cost the company a total of $18,900. All for that one horrific click!

Grave Consequences

“Many small and medium enterprises think they’re adequately protected against security threats because they have antivirus software, but the reality is that cybercriminals can bypass that software by tricking an employee into clicking a link in a phishing e-mail,” Sjouwerman says. “Most business owners have no idea of the time and cost involved in disinfecting a workstation, let alone an entire network. [The breached company] paid nearly $20,000 to undo the damage caused by one employee’s unwitting click. Those costs would have been exponentially higher for a midsize company with a larger network. And just think how much a business stands to lose when cybercriminals use their network access to capture login information and passwords for bank accounts and other financial transactions. That’s when losses rapidly escalate into six figures.”

Sjouwerman points out that the moral to this haunted mouse tale is that such escalations need not occur.

“Our research has shown that training can reduce employees’ susceptibility to phishing attacks by 75 percent after the very first session,” he says, “and that subsequent testing and retraining can shrink the percentage to close to zero in a matter of weeks. . . . It pays to invest in cybercrime prevention training.”

Sjouwerman adds that, thanks to a free phishing security test on KnowBe4’s website, the initial part of such an investment costs nothing more than a bit of time. He encourages owners of small- and medium-size businesses to take advantage of the test (at www.knowbe4.com/phishing-securitytest/) to learn how many of their employees are Phish-prone™, or susceptible to phishing attacks. The module takes only a few minutes to complete and might well help avoid a nightmarish situation later.

This article originally appeared in the October 2011 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3