Rise in cyberattacks, digital security will be a challenge to news companies
Conference Blog | 24 July 2024
In the digital era, online security has become a primary concern for individuals and organisations alike, including media companies. The increase in connected devices and the massive use of digital platforms have created fertile ground for cyberattacks.
From social media to banking systems and e-mails, exposure to cyberthreats is higher than ever. This situation is exacerbated by poor security practices, such as using the same password across multiple platforms.
During INMA’s recent Latin-American Conference, Manuel Felipe Rodríguez, a cybersecurity expert at Check Point, told attendees cyberattacks have diverse motivations and can affect any industry. The COVID-19 pandemic worsened the situation, boosting remote work and exposing new vulnerabilities.
Vulnerabilities arise when, for example, a person uses a personal computer for both work and entertainment, or when users let family or children use the computer for gaming purposes.
Media outlets are also the target of attackers. A simple message received on a cellphone can be the starting point of a massive attack against one company, like the attack against Cambio, a Colombian magazine, after it published a journalist investigation, Rodríguez said.
Connected devices and associated risks
Devices such as Alexa, smart appliances, televisions, and other network-connected gadgets have become integral parts of our daily lives. However, the more connected we are, the greater the risk of suffering a cyberattack, Rodríguez said.
Furthermore, the information of organisations and individuals is spread across multiple locations and devices, such as the cloud, data centers, servers, computers, and tablets, complicating data protection even more.
Cyberattacks can take various forms, each with its own methodology and objective. Among the most common are:
-
Malware: Malware is malicious software that infiltrates a device to damage it or conduct espionage. It can be extremely harmful, not only to the affected device but also to the network it is connected to.
-
Phishing and identity theft: Phishing is a technique used to deceive users into revealing sensitive information, such as passwords or bank details. Attackers often pose as trustworthy entities to obtain this information. Identity theft is another common technique, where attackers impersonate someone else to gain access to data or systems.
-
Ransomware: It is one of the most devastating attacks for organisations, Rodríguez emphasized. Ransomware involves the hijacking of data, where attackers demand a ransom in exchange for restoring access to the information. A notable example of this was the 2017 ransomware attack that affected the MGM hotel chain, resulting in losses of approximately US$100 million.
Trends in cyberattacks
Check Point, in its cyberattack trends report, highlights five key areas of concern:
1. Mega ransomware attacks: These attacks are becoming increasingly frequent and devastating, potentially disrupting the normal operations of a company in any sector.
2. Edge devices: Machines on the edge of the network are attractive targets for attackers due to their vulnerabilities.
3. Hacktivism and nation-state wipers: Politically motivated attacks and malware programmes that erase data are increasingly common. For example, a hacker might take over a system, such as a media outlet’s portal homepage, to publish politically charged or subversive messages.
4. Tokens under attack: Authentication outside traditional systems is a target for attackers. Such an attack can occur when a user remotely connects to their company’s servers.
5. Developer supply chain: Attackers target developers and their tools to introduce vulnerabilities into software.
Artificial Intelligence and deepfakes
Artificial intelligence (AI) is being used both to enhance security and to conduct more sophisticated attacks. Deepfakes, which are extremely realistic digital forgeries of a person’s voice and appearance, pose a significant challenge as they can be used to convincingly impersonate identities.
Protection strategies
Considering this scenario, it is crucial to implement robust protection strategies. Rodríguez said it is more common than expected that people use the same password for their e-mail account, their streaming services, or to access their bank, where most or all their money is saved.
This a grave mistake because it makes it easier for hackers to attack. He brings up a case that happened to a friend of his, who received an e-mail message saying that he no longer had control of the access to his bank account. The attackers asked him for ransom and the friend spent months trying to regain access to his bank account.
For this reason, some recommendations include:
-
Use of password managers: Utilise tools that store passwords securely.
-
Regular software updates: Keeping all systems and applications updated helps protect against known vulnerabilities.
-
Awareness and education: Inform users about the risks of cyberattacks and best security practices. In many countries, organisations are legally required to disclose if they have been victims of an attack and provide details about it, Rodríguez said.
-
Be suspicious: Watch for e-mails, WhatsApp messages, or SMS asking you to change or update passwords or provide personal information. Banks don’t do that. Don’t click on links provided in these messages, either.
Sequence of events in an attack
According to Check Point, the process of a cyberattack usually follows a predictable pattern. Initially, the attacker identifies a vulnerability, whether through a malicious e-mail, a compromised link, or a software weakness. Once access is established, the attacker can deploy malware, gather information, or launch a ransomware attack.
Cyberattacks have not only significant financial costs but also reputational impacts. In the case of media outlets, an attack can compromise their ability to publish reliable information, eroding audience trust. An example of this is defacement, where attackers alter a Web page to post information that has nothing to do with the attacked outlet.
The recent global outage of digital platforms — which affected airport systems, train stations, and hospitals — is a stark reminder of our dependence on technology and the vulnerability of our systems to cyberattacks, although in this case the problem originated in a software update.
The question arises: Could a similar outage have been caused by a cyberattack?
The answer is not simple, but what is clear is that cybersecurity must be a priority for both individuals and news organisations. Adopting robust security practices, constantly updating systems, and continuous education on risks and attack methods are essential to mitigate threats in this increasingly complex digital landscape.