Skip to main content

North Korean Insiders 

A recent incident involving a North Korean threat actor, hired under false pretences as a remote IT contractor, has highlighted the rising threat of social engineering tactics, particularly aimed at financial organisations. North Korean cyber operatives are increasingly using sophisticated social engineering techniques to bypass standard security protocols, posing as credible professionals with fabricated work histories and identities to gain employment. These attackers leverage the trust established through their false identities to infiltrate companies, making it difficult for organisations to detect them until damage has been done. 

Valentina Martinez
Valentina Martinez

Cyber Security Analyst | Cyber Risk

vmartinez@thomasmurray.com

This infiltration approach, centred on social engineering, has recently targeted financial organisations, as they manage highly valuable and sensitive data that is critical to both individual security and broader economic stability. Once embedded, these operatives engage in data theft, gaining access to financial records, client information, and other critical data that can then be held for ransom or sold. Such targeted attacks on the financial sector underline a dual risk: the direct threat of data exfiltration and the potential financial and reputational consequences of failing to comply with extortion demands. 

Social engineering tactics in these attacks are increasingly nuanced, as attackers adapt to evade detection, blending seamlessly into digital workforces and creating a veneer of credibility that allows them to avoid immediate suspicion. This highlights the need for financial organisations, in particular, to prioritise advanced identity verification processes and to strengthen monitoring for unusual behaviours that could indicate an insider threat. Additionally, bolstering employee awareness of social engineering risks is crucial; training staff on how to recognise potential red flags can act as a frontline defence against these sophisticated tactics. Given the recent focus on financial institutions, enhanced threat intelligence efforts will also be essential in pre-empting similar social engineering-based attacks and protecting valuable financial data from highly skilled adversaries. 

Firm hacked after accidentally hiring North Korean cyber criminal - BBC News 

Sellafield hit with regulator fines 

The recent cyber security incident involving Sellafield Ltd, a major UK nuclear reprocessing and decommissioning site, highlights the importance of strict adherence to cyber security protocols in high-risk industries. Between 2019 and 2023, Sellafield experienced a series of cyber security shortcomings, which were uncovered by the UK’s Office for Nuclear Regulation (ONR). This investigation found that Sellafield had not fully implemented its approved cyber security protocols, leaving critical IT systems vulnerable to exploitation. Specific vulnerabilities were left unpatched, creating potential entry points for threats like ransomware, phishing, and other forms of cyber attack. 

While no cyber incidents have been reported as a result of these vulnerabilities, the risk posed to Sellafield was substantial. The facility’s operations involve handling nuclear materials and overseeing high-hazard tasks, making any disruption potentially catastrophic. Unpatched systems and procedural lapses not only heightened the risk of data breaches but also posed a threat to the integrity of sensitive nuclear operations, which rely on continuous security and operational stability. The ONR’s investigation ultimately concluded that these cyber security gaps could jeopardise Sellafield's ability to maintain safe, secure operations, leading to a fine of £332,500 as a regulatory response to enforce higher standards. 

In light of this incident, Sellafield has since committed to significant upgrades in its cyber security frameworks, including improvements to network architecture, systems resilience, and procedural oversight to prevent similar lapses in the future. This situation serves as a warning about the importance of robust cyber security, particularly in industries where operational security is paramount to public and environmental safety. 

UK nuclear site Sellafield fined $440,000 for cybersecurity shortfalls 

Fidelity breach 

The recent data breach at Fidelity Investments, which exposed the personal information of over 77,000 customers, highlights critical risks faced by the financial services sector in protecting sensitive customer data. Financial institutions handle vast volumes of personal and financial information, making them prime targets for cyber criminals. In this case, an unauthorised actor gained access to customer names and personal identifiers, even though no financial accounts were directly affected. However, the incident brings to light several ongoing risks that are particularly acute for the financial services industry. 

Firstly, breaches of personal information significantly increase the risk of identity theft and fraud. Compromised personal identifiers can be exploited by cyber criminals to impersonate individuals, resulting in fraudulent activities like opening accounts, applying for credit, or securing loans under false pretenses. This not only impacts affected individuals but also complicates the institution's efforts to authenticate legitimate customers and prevent further fraud, especially as stolen data circulates on dark web forums and is often used repeatedly in phishing schemes. 

Additionally, breaches can severely harm a financial institution’s reputation and diminish customer trust. Clients rely on financial firms to uphold high standards of data security, and any lapse may erode confidence in the firm’s ability to protect assets and personal information. This loss of trust can have lasting consequences, affecting customer retention and potentially deterring new clients, particularly as customers grow increasingly aware of data privacy risks. 

The regulatory impact of such breaches is another significant concern. Financial institutions are held to rigorous data protection standards under laws like the GDPR, CCPA, and industry-specific regulations from bodies like the SEC and FINRA. Data breaches can attract penalties and lead to heightened regulatory scrutiny, with regulators often requiring firms to adjust cyber security policies to meet higher standards. The costs associated with these adjustments and potential fines underscore the financial impact of cyber security lapses and the need for continuous improvement in security frameworks. 

Finally, incidents like this impose substantial costs on firms through increased monitoring and customer protection expenses. Fidelity’s provision of two years of free credit monitoring and identity restoration services for affected individuals is a necessary step in customer protection but represents a costly response to a breach. Such expenses often drive financial institutions to re-evaluate their investments in preventative security measures to avoid future incidents. 

Overall, this breach at Fidelity serves as a stark reminder to financial services of the persistent threat landscape and the importance of robust, proactive cyber security strategies. As the sector continues to digitise, maintaining strong protections against data breaches and preparing for swift, effective responses will be critical to safeguarding both sensitive information and customer trust in the increasingly interconnected world of finance. 

Fidelity Investments says data breach affects over 77,000 people 

Threat actors targeting financial entities in October 2024

 

Threat actors targeting financial entities in October 2024 

Ransomware vs Finance (last three months)

Ransomware vs Finance (last three months)

Cyber Risk

Cyber Risk

We bring the best of our collective experience, energy and creative power to fiercely safeguard our clients and fortify their communities.

Learn more
Thomas Murray cyber alerts

Thomas Murray cyber alerts

Subscribe to stay up to date with developing threats in the cyber landscape