Technology

Posted on April 4, 2017 by staff

Huge cyber espionage campaign ‘targets UK businesses’

Technology

A prolific global cyber espionage campaign is employing new tactics to target a broad audience, according to an investigation by both the public and private sector in the UK.

The threat actor, widely known as APT10, is believed to be behind the attack, targeting providers of managed outsourced IT services as a way to access to customers’ organisations around the world, gaining unprecedented access to intellectual property and sensitive data.

A close working collaboration between private sector companies, including PwC, and the UK’s National Cyber Security Centre led to identifying and disrupting the campaign.

Systemic cyber breaches demonstrate new level and maturity of targeted attacks against the supply chain, compromising outsourced IT service providers to gain widespread access to thousands of organisations.

PwC’s cyber security practice worked closely with BAE Systems and other members of the security community, to uncover and disrupt what is thought to be one of the largest ever sustained global cyber espionage campaigns.

Richard Horne, cyber security partner at PwC, commented: “The future of cyber defence lies beyond simple intelligence sharing, but in forging true collaboration between organisations in the public and private sector with the deep technical and innovative skills required to combat this type of threat.

“This operation has demonstrated the importance of the recently established National Cyber Security Centre, set up for moments just like this.

“Operating alone, none of us would have joined the dots to uncover this new campaign of indirect attacks.

“Together we’ve been working to brief the global security community, managed service providers and known end victims to help prevent, detect and respond to these attacks.

“New forms of attack require new ways of working to defend our society. Close working collaboration is key.”

The scale of the threat became increasingly apparent in late 2016.

The sheer scale of the operation was only uncovered through collaboration, and is still only likely to reflect a small portion.

Kris McConkey, partner, cyber threat detection and response at PwC, will present on the findings of his firm’s joint research at the Kaspersky Security Analyst Summit in St. Maarten, said: “The indirect approach of this attack highlights the need for organisations to have a comprehensive view of the threats they’re exposed to – including those of their supply chain.

“Alongside our research work, we have also notified the threat intelligence community and worked with the NCSC to notify managed service providers and known victims.

“This is a global campaign with the potential to affect a wide range of countries, so organisations around the world should work with their security teams and providers to check networks for the key warning signs of compromise and ensure they respond and protect themselves accordingly.”