Digital Devices of Corporate Brass Ripe for Hacker Attacks | TechNewsWorld

2022-09-10 03:59:40 By : Mr. Jianming Zhu

Digital devices and home networks of corporate executives, board members and high-value employees with access to financial, confidential and proprietary information are ripe targets for malicious actors, according to a study released Tuesday by a cybersecurity services firm.

The connected home is a prime target for cybercriminals, but few executives or security teams realize the prominence of this emerging threat, noted the study based on an analysis of data from more 1,000 C-suite, board members and high profile executives from over 55 U.S.-based Fortune 1000 companies who are using the executive protection platform of BlackCloak.

“BlackCloak’s study is exceptional,” observed Darren Guccione, CEO of Keeper Security, a password management and online storage company.

“It helps illuminate the pervasive issues and vulnerabilities caused by millions of businesses migrating to distributed, remote work while at the same time, transacting with corporate websites, applications and systems from unsecured home networks,” he told TechNewsWorld.

BlackCloak’s researchers discovered that nearly a quarter of the executives (23%) have open ports on their home networks, which is highly unusual.

BlackCloak CISO Daniel Floyd attributed some of those open ports to third-party installers. “They’re an audio-visual or IT company that, because they don’t want to send a truck out when things break, they’ll set up port-forwarding on the firewall,” he told TechNewsWorld.

“It allows them to remotely connect to the network to solve problems,” he continued. “Unfortunately, they’re being set up improperly with default credentials or vulnerabilities that haven’t been patched for four or five years.”

An open port resembles an open door explained Taylor Ellis, a customer threat analyst with Horizon3 AI, an automated penetration testing as a service company in San Francisco. “You wouldn’t leave your door unlocked 24/7 in this day and age, and it’s the same way with an open port on a home network,” he told TechNewsWorld.

“To a business leader,” he continued, “the threat of breaking and entering escalates when you have an open port providing access to sensitive data.”

“A port acts like a communication gateway for a specific service hosted on a network,” he said. “An attacker can easily open a backdoor into one of these services and manipulate it to do their bidding.”

Of the open ports on the home networks of corporate brass, the report noted, 20% were connected to open security cameras, which can also pose a risk to an executive or board member.

“Security cameras have often been used by threat actors both to plant and distribute malware, but perhaps more importantly to provide surveillance on patterns and habits — and if the resolution is good enough, to see passwords and other credentials being entered,” noted Bud Broomhead, CEO of Viakoo, a developer of cyber and physical security software solutions in Mountain View, Calif.

“Many IP cameras have default passwords and out-of-date firmware, making them ideal targets for being breached and once breached making it easier for threat actors to move laterally within the home network,” he told TechNewsWorld.

The BlackCloak researchers also discovered that the personal devices of corporate brass were equally, if not more, insecure than their home networks. More than a quarter of the execs (27%) had malware on their devices, and more than three-quarters of their devices (76%) were leaking data.

One way data leaks from smartphones is through applications. “A lot of apps will ask for sensitive permissions that they don’t need,” Floyd explained. “People will open the app for the first time and just click through the settings not realizing they’re giving the app access to their location data. Then the app will sell that location data to a third party.”

“It’s not only executives and their personal devices, it’s everyone’s personal devices,” added Chris Hills, chief security strategist at BeyondTrust, maker of privileged account management and vulnerability management solutions in Carlsbad, Calif.

“The amount of data, PII, even PHI, that the common smartphone contains these days is mind-boggling,” he told TechNewsWorld. “We don’t realize how vulnerable we can be when we don’t think about security as it relates to our smartphones.”

Personal device security doesn’t seem to be top of mind for many executives. The study found that nearly nine out of 10 of them (87%) have no security installed on their devices.

“Many devices ship without security software installed, and even if they do it may not be sufficient,” Broomhead noted. “For example, Samsung Android devices ship with Knox security, which has had security holes found in it previously.”

“The device manufacturer may try to make tradeoffs between security and usability that may favor usability,” he added.

Hills maintained that most people are comfortable and content in thinking that the underlying operating system of their smartphone contains the needed security measures to keep the bad guys out.

“For the common person, it’s probably enough,” he said. “For the business executive that has more to lose given their role in a business or company, the security blanket of the underlying operating system just isn’t enough.”

“Unfortunately, in most cases,” he continued, “there is so much we focus on trying to protect as individuals, sometimes some of the most common get overlooked, such as our smartphones.”

Another finding by the BlackCloak researchers was that most personal accounts of executives, such as email, e-commerce, and applications, lack basic privacy protections.

In addition, they discovered security credentials of executives — such as bank and social media passwords — are readily available on the dark web, making them susceptible to social engineering attacks, identity theft, and fraud.

Nearly nine of 10 executives (87%) have passwords currently leaked on the dark web, the researchers noted, and more than half (53%) are not using a secure password manager. Meanwhile, only 8% have activated multifactor authentication enabled across a majority of the applications and devices.

“While measures like multifactor authentication aren’t perfect, these basic best practices are essential, especially for the board/C-suite who often opt-out of the requirement as a matter of convenience,” Melissa Bischoping, an endpoint security research specialist with Tanium, maker of an endpoint management and security platform in Kirkland, Wash. told TechNewsWorld.

“Attacking personal digital lives might be a new risk for enterprises to consider,” the researchers wrote, “but it is a risk that requires immediate attention. Adversaries have determined that executives at home are a path of least resistance, and they will compromise this attack vector for as long as it is safe, seamless, and lucrative for them to do so.”

John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.

Please sign in to post or reply to a comment. New users create a free account.

When shopping online for the best price for a product, where to you normally check first? E-commerce marketplace e.g., Amazon, eBay, Etsy Price comparison site e.g., Google Shopping, PriceGrabber Retailer that specializes in the product Search engine Social media  Loading ...

E-commerce marketplace e.g., Amazon, eBay, Etsy

Price comparison site e.g., Google Shopping, PriceGrabber

Retailer that specializes in the product

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/06/cyberwarfare-3-300x156.jpg

https://www.technewsworld.com/story/attacks-on-cloud-service-providers-down-25-during-first-4-months-of-2022-176678.html

Attacks on Cloud Service Providers Down 25% During First 4 Months of 2022

Canonical Lets Loose Ubuntu 22.04 LTS ‘Jammy Jellyfish’

Low-Code Platforms Help Ease the Shadow IT Adversity Pain

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/Apple-Watch-Ultra-lifestyle-adventure-300x156.jpg

https://www.technewsworld.com/story/apple-refreshes-product-lines-introduces-new-ultra-watch-177074.html

Apple Refreshes Product Lines, Introduces New Ultra Watch

Study Finds Sports Is King Among Livestreamers

New Cisco Conferencing Devices Designed To Heal Meeting Fatigue

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/amd-and-intel-300x156.jpg

https://www.technewsworld.com/story/amd-vs-intel-suddenly-the-desktop-pc-is-in-play-177042.html

AMD vs. Intel: Suddenly the Desktop PC Is in Play

Electronics Will Cost More in 2023

Apple Shows Off Vast Upgrades to Software, Hardware, User Experiences at WWDC22

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/Intehill-QLED-Portable-Monitor-Review-300x156.jpg

https://www.technewsworld.com/story/intehill-15-6-portable-monitor-is-masterful-at-work-and-play-177050.html

Intehill 15.6″ Portable Monitor Is Masterful at Work and Play

How Not To Do CX, Lenovo Style

Coding Vulnerabilities, Linux Growth, FOSS Friction Cap Summer Highlights

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/2FA-300x156.jpg

https://www.technewsworld.com/story/evilproxy-phishing-service-threatens-mfa-protection-of-accounts-177061.html

EvilProxy Phishing Service Threatens MFA Protection of Accounts

Forrester Report Cautions About Web3 Security

IT Security Pros Push for Consolidated Standards, Vendor Products

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/server-room-300x156.jpg

https://www.technewsworld.com/story/security-demands-shifting-business-backups-away-from-on-prem-boxes-176873.html

Security Demands Shifting Business Backups Away From On-Prem Boxes

Data Observability’s Big Challenge: Build Trust at Scale

The Business Case for Clean Data and Governance Planning

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/devops-300x156.jpg

https://www.technewsworld.com/story/leapwork-ceo-no-code-platforms-democratize-testing-automation-176913.html

Leapwork CEO: No-Code Platforms Democratize Testing Automation

Cognitive Skills for Engineering Success

Apple and Microsoft Developers Conferences Exhibit Companies’ Strengths, Weaknesses

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/virtual-try-on-300x156.jpg

https://www.technewsworld.com/story/vr-platforms-deliver-metaverse-style-experiences-to-online-shopping-176865.html

VR Platforms Deliver Metaverse-Style Experiences to Online Shopping

The Coming Wave of Next-Generation Home Solar Companies

Accent Altering Voice Tech Aims To Replace Frustration With Communication

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/accountant-300x156.jpg

https://www.technewsworld.com/story/b2b-funding-firms-banking-on-embedded-finance-176805.html

B2B Funding Firms Banking on Embedded Finance

Unresolved Conflicts Slow eSIM Upgrade Path to Better IoT Security

Cryptocurrency Custody Concerns: Who Holds the Digital Storage Keys?

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/gaming-rig-300x156.jpg

https://www.technewsworld.com/story/cloud-gaming-poised-for-takeoff-177028.html

Cloud Gaming Poised for Takeoff

Qualcomm and the Mobile Video Game Revolution

Stat Firm Reports Less Than 1% of Subscribers Playing Netflix Games

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/cyberwarfare-2-300x156.jpg

https://www.technewsworld.com/story/chinese-hackers-deploy-fake-news-site-to-infect-government-energy-targets-177036.html

Chinese Hackers Deploy Fake News Site To Infect Government, Energy Targets

5 Cyber Safety Tips To Survive the Internet, Hackers and Scammers

Top Universities Exposing Students, Faculty and Staff to Email Crime

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/06/KYY-Portable-Monitor-300x156.jpg

https://www.technewsworld.com/story/kyy-15-6-portable-monitor-packs-value-with-a-healthy-feature-set-176836.html

KYY 15.6″ Portable Monitor Packs Value With a Healthy Feature Set

New Linux Laptop Line Advances HP, System76 Open-Source Collaboration

Microsoft’s Innovative 4-Processor PC

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/covid-news-smartphone-300x156.jpg

https://www.technewsworld.com/story/meta-moves-to-back-off-removing-covid-misinformation-from-platforms-176937.html

Meta Moves To Back Off Removing Covid Misinformation From Platforms

Hack Your Metabolism To Improve Health With the Lumen Smart Device

Amazon Rolls Out Alexa for Senior Living and Healthcare Providers

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/home-security-300x156.jpg

https://www.technewsworld.com/story/home-security-market-thriving-despite-dread-of-false-alarms-176935.html

Home Security Market Thriving Despite Dread of False Alarms

Digital Devices of Corporate Brass Ripe for Hacker Attacks

Home Automation Faces 3 Perpetual Problems

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/smartphone-user-puzzled-300x156.jpg

https://www.technewsworld.com/story/6-signs-cybercriminals-infected-your-phone-and-how-to-fix-it-176911.html

6 Signs Cybercriminals Infected Your Phone and How To Fix It

Start Here When Things Go Wrong on Your Linux System

Computers Use Processes, So Should You

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/06/canonical-ubuntu-300x156.jpg

https://www.technewsworld.com/story/ubuntu-core-22-release-addresses-challenges-of-iot-edge-computing-176583.html

Ubuntu Core 22 Release Addresses Challenges of IoT, Edge Computing

Foundries and Arduino Team To Patch IoT Devices

Remote Work Heightens Privacy and Security Anxiety Among Employees

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/press-conference-300x156.jpg

https://www.technewsworld.com/story/tech-whistleblowers-prefer-loud-exit-to-quiet-quitting-177039.html

Tech Whistleblowers Prefer Loud Exit To Quiet Quitting

Denmark Tops in Digital Quality of Life, US in Fifth Place

Unprotected Machine Identities Newest Enterprise IT Security Concern

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/microsoft-word-300x156.jpg

https://www.technewsworld.com/story/new-software-vulnerability-zeroes-in-on-microsoft-programs-176806.html

New Software Vulnerability Zeroes In on Microsoft Programs

Hackers Cast LinkedIn as Most-Popular Phishing Spot

Forrester Pegs B2B Fraud, Cyber Insurance Complacency as Top Threats in 2022

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/boy-screen-time-300x156.jpg

https://www.technewsworld.com/story/kids-screen-use-sees-fastest-rise-in-4-years-176735.html

Kids’ Screen Use Sees Fastest Rise in 4 Years

Sports Betting Platforms Gambling With Substandard CX

Appdome CEO on Mobile App Security: No Developer, No Code, No Problem

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/Titan-Linux-300x156.jpg

https://www.technewsworld.com/story/titan-linux-beta-brings-simplicity-finesse-to-kde-remake-176554.html

Titan Linux Beta Brings Simplicity, Finesse to KDE Remake

Linux Security Study Reveals When, How You Patch Matters

New Breeze Theme Gives KDE Neon Release Lots of Sparkle

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/personal-file-300x156.jpg

https://www.technewsworld.com/story/pii-of-many-fortune-1000-execs-exposed-at-data-broker-sites-176668.html

PII of Many Fortune 1000 Execs Exposed at Data Broker Sites

US-Led Seizure of RaidForums May Defy Lasting Effect on Security

Atlas VPN Debuts MultiHop+ for Added Layer of Internet Privacy and Security

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/innoview-pm004-300x156.jpg

https://www.technewsworld.com/story/innoviews-15-6-4k-portable-panel-could-be-the-ultimate-touchscreen-accessory-176726.html

InnoView’s 15.6″ 4K Portable Panel Could Be the Ultimate Touchscreen Accessory

Rebuilding Ukraine: 3D Printing and the Metaverse Could Help Create the Cities of Tomorrow

InnoView 15.8″ Portable Display: More Screen Space for Small Devices

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/Space-BACN-300x156.jpg

https://www.technewsworld.com/story/darpa-moves-forward-with-project-to-revolutionize-satellite-communication-177003.html

DARPA Moves Forward With Project To Revolutionize Satellite Communication

Science, Art Inspire Women in Tech Entrepreneurship

Why Commercial Space Travel Is Unlikely To Scale Up

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/microsoft-bing-300x156.jpg

https://www.technewsworld.com/story/microsoft-bing-yandex-create-new-search-protocol-87311.html

Microsoft Bing, Yandex Create New Search Protocol

Botify SEO Platform Helps Brands Navigate Organic Search Rankings

Google Cloud Seeks To Cure Retailers’ Search Woes, Help Compete With Amazon

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/server-admins-300x156.jpg

https://www.technewsworld.com/story/cyber-asset-management-overwhelming-it-security-teams-87457.html

Cyber Asset Management Overwhelming IT Security Teams

30 Years of Linux History Told via Distros

Stale Open Source Code Rampant in Commercial Software: Report

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/digital-wallet-qr-code-300x156.jpg

https://www.technewsworld.com/story/whats-in-store-for-next-gen-digital-wallets-87451.html

What’s in Store for Next-Gen Digital Wallets

Apple Refreshes iPhone SE, iPad Air, Debuts Studio Desktop

Tesla Smartphone Could Be a Game Changer

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/social-media-apps-300x156.jpg

https://www.technewsworld.com/story/a-third-of-us-social-media-users-creating-fake-accounts-176987.html

A Third of US Social Media Users Creating Fake Accounts

Amazon Lawsuit Fingers Facebook Groups Recruiting Fake Reviewers

Big Tech Firms Move To Squash Deceptive Info on Ukraine Crisis

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/global-disaster-300x156.jpg

https://www.technewsworld.com/story/nvidia-launches-earth-2-and-goes-to-war-against-climate-change-87336.html

Nvidia Launches Earth 2 and Goes to War Against Climate Change

Kuo Predicts ‘iPhone 13’ Will Support Satellite Calls and Texting

30 Years Later, the Trajectory of Linux Is Star Bound

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/handwrytten-300x156.jpg

https://www.technewsworld.com/story/robotic-letter-writing-lends-a-hand-to-personalized-marketing-crm-176595.html

Robotic Letter Writing Lends a Hand to Personalized Marketing, CRM

Don’t Become a Fool in the IT Gold Rush

Marketers: Beware Florida’s Mini-TCPA

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/surface-duo-2-300x156.jpg

https://www.technewsworld.com/story/microsoft-finally-has-truly-competitive-alternatives-to-apple-products-87282.html

Microsoft Finally Has Truly Competitive Alternatives to Apple Products

New iPad Mini Stars at Apple Refresh Event

Chromebook Shipments Jump 75% YoY in Q2

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/tug-of-war-300x156.jpg

https://www.technewsworld.com/story/musk-twitter-qualcomm-apple-netflix-microsoft-deciphering-the-insanity-176915.html

Musk-Twitter, Qualcomm-Apple, Netflix-Microsoft: Deciphering the Insanity

The World Is Not Yet Ready for Electric Cars

The Importance of the Metaverse Standards Forum

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/eu-gavel-300x156.jpg

https://www.technewsworld.com/story/new-eu-law-will-force-google-meta-others-to-expose-algorithms-176689.html

New EU Law Will Force Google, Meta, Others To Expose Algorithms

Pandemic, Compliance Driving Increased Privacy Spending

Report Argues Antitrust Bill Would Hurt Consumers, Stymie Innovation

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/Lucid-Air-300x156.jpg

https://www.technewsworld.com/story/lucid-nvidia-and-the-rapidly-changing-future-of-electric-cars-176927.html

Lucid, Nvidia and the Rapidly Changing Future of Electric Cars

Rapid EV Adoption by Low-Income Drivers Needed To Curb Climate Change: Report

BlackBerry and Preparing for the Software-Defined Automobile

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/metaverse-future-300x156.jpg

https://www.technewsworld.com/story/nvidia-and-disney-can-breathe-life-into-the-metaverse-176993.html

Nvidia and Disney Can Breathe Life Into the Metaverse

The Metaverse Future: Are You Ready To Become a God?

New Recipe for Marketing Success: Blend Digital and CX, Mix Well With AI

https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/vr-metaverse-300x156.jpg

https://www.technewsworld.com/story/apple-mr-specs-will-shun-metaverse-report-87385.html

Apple MR Specs Will Shun Metaverse: Report

Apple Wearables Holiday Sales Knock It Out of the Park

5 Terrific Tech Gift Ideas for Your Holiday Shopping List

https://www.technewsworld.com/wp-content/uploads/sites/3/2021/07/xl-2016-hacker-2-300x184.jpg

https://www.technewsworld.com/story/cybercriminals-employing-specialists-to-maximize-ill-gotten-gains-87200.html

Cybercriminals Employing Specialists To Maximize Ill-Gotten Gains

Encouraging Research Finds Brain Adjusts to ‘Third Thumb’

E-Commerce Tending to Health and Wellness Needs

Copyright 1998-2022 ECT News Network, Inc. All Rights Reserved.

Enter your Username and Password to sign in.