Insider Threat: Hackers Paying Company Insiders to Bypass Security
Overview
A recent report from Check Point Research reveals a troubling trend of cyber criminals targeting company insiders to gain unauthorized access to sensitive information. Hackers are using platforms like the darknet and Telegram to recruit employees from major organizations, including banks, telecom companies, and tech firms. They are reportedly offering payments of up to $15,000 for insider access to companies such as Apple, Coinbase, and the Federal Reserve. This practice raises significant security concerns, as it can lead to data breaches and financial losses for these organizations. Companies must be vigilant about insider threats and implement stronger security measures to protect against this growing risk.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Apple, Coinbase, Federal Reserve, various banks, telecoms, tech giants
- Action Required: Companies should enhance insider threat programs, conduct regular security training for employees, and monitor for unusual activity within their networks.
- Timeline: Newly disclosed
Original Article Summary
A new report from Check Point Research reveals a growing trend of cyber criminals recruiting employees at banks, telecoms, and tech giants. Learn how hackers use the darknet and Telegram to offer payouts up to $15,000 for internal access to companies like Apple, Coinbase, and the Federal Reserve.
Impact
Apple, Coinbase, Federal Reserve, various banks, telecoms, tech giants
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Companies should enhance insider threat programs, conduct regular security training for employees, and monitor for unusual activity within their networks.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Apple, Data Breach, Check Point.