There Has Been a Data Breach: Now What?

 


Hacker : a person who uses computers to gain unauthorized access to data.

They say that prevention is better than finding a cure, but in the case of the Telecommunication Services of Trinidad and Tobago (TSTT), that is no longer an option. 

Six gigabytes of sensitive data are now up for grabs on the dark web (the internet's equivalent of the black market). 

From internal administrative credentials to customer names and addresses, you can access it all using The Onion Router (Tor).


RansomEXX has successfully bypassed all the controls that were meant to mitigate TSTT's risk of a cyberattack. 

I deliberately italicized the word 'controls' since, based on what Alex Samm said in his post on this topic, passwords were not encrypted, and RansomEXX's modus operandi usually involves gaining access through phishing.


Now, I'm not saying that TSTT did nothing to prevent this, but storing passwords as plain text in a text file does make me raise my eyebrows.

Alex also made a good point regarding how this matter was addressed on social media. 

While some individuals may have blocked out the text on ID cards, the pictures of these customers should have also been concealed.


With that being said, here is what to do in the event of a data breach:


Contain the Breach

As soon as the breach is detected, take immediate steps to contain it. Isolate affected systems, networks, or accounts to prevent further unauthorized access.

Assess the Scope and Impact

Determine the extent of the breach. Identify what data was compromised, how it happened, and who or what systems were affected. This may require forensic analysis.

Be Transparent 

Customers have a right to know. In case of a breach, publish a detailed report. In our info age, an official document beats speculation.

Learn and Adapt

If we assume that the hackers infiltrated our system through a phishing email, introducing phishing simulators can help raise employee awareness about these threats, thereby mitigating the risk of future attacks utilizing the same strategy. 


Resources 

News Article : 1 Million TSTT Customers Records on the Dark Web

Alex Samm : A Month in Review - Ransomware attack in Trinidad

Phishing Simulation : Terranova Security

Social Engineering : People Hacking Video

Social Engineering : A Book Recommendation

Comments

Popular posts from this blog

Missing Data : What to Do?

Prompt Engineering : An Introduction

Upskilling: Certificates vs. Certifications

Women In STEM : Challenges and Advantages

SQL Server Reporting Services vs. Power BI

5 Authentication Methods

Inductive and Deductive Reasoning

Improving SQL Query Performance : Indexes

Don't Be Bland : Spice Up Your Personal Brand