February 4, 2015 By Michelle Alvarez 2 min read

Imagine disgruntled employees who oppose the practices of their company. One day, one of these employees downloads sensitive or confidential company documents, announces his or her resignation, then tells the tale to a journalist friend. These unfavorable practices become front-page news, and the company’s public relations and legal teams have to spend millions of dollars to repair the company’s tarnished brand. This fictitious company experienced a very plausible insider threat scenario.

Do you think your employees are incapable of committing such actions? Thankfully, most are not — but which ones are? The truth is, it makes companies a little uneasy to view employees or co-workers as potential threats. However, this is the reality we live in, and businesses need to consider protecting against the insider threat as they would any other threat. Individuals inside your organization may have an understanding of the company’s weaknesses or have access to areas that an external person may not. This gives them an obvious advantage since they have no need to bypass protection systems to obtain sensitive information.

The Benign Threat

Many are quick to link insider threats to disgruntled employees. However, most breaches are actually unintentional. According to the Privacy Rights Clearinghouse, there have been just over 226 million records reported compromised in the United States since 2005 due to unintended disclosure. This means one-fourth of all records compromised are the result of negligence. Unintended disclosure could come in the form of posting information on the company’s public-facing website or sending information to the wrong party via email, fax or mail.

The Malignant Threat

Though the motivations of malicious insiders vary, there is one motivator that clearly reigns above the rest: financial gain. Sensitive information yields a high return on the black market — more victims equal more money. Financial gain is a popular motive, but it is not the only one. Disgruntled employees may want to retaliate by causing a denial of service or defacing a company’s website.

If money-hungry or unhappy employees don’t make a move, there is always nation-state hacktivism. Insiders sponsored by a national government to perform cyber espionage have become more prevalent. Their goals may vary from website defacement to more serious attacks, such as the destruction of vital infrastructure.

Insider Threat Methods

Selling or destroying sensitive information or systems are popular avenues. A tech-savvy insider could target known vulnerabilities in an important application to either obtain information or cause other damage. Unauthorized users may have the ability to log in to applications to which they should not have access. Even authorized users could present a problem if their actions aren’t monitored. Accessing rogue and/or insecure Wi-Fi access points is another area of concern. Whether working remotely or from the office, employees often unwittingly open malicious emails and attachments that let attackers exploit the targeted system. Negligent behavior can be just as big of a security risk as malicious conduct.

Outing the Insider

Fortunately, there are a number of solutions available to organizations that mitigate the insider threat. Products that monitor behavior and provide anomaly detection are key. Focusing on access management and, more specifically, privileged identity management is an important step toward preventing data breaches. Additionally, by implementing a complete data life cycle management approach, an organization can go a long way toward fighting against malicious insiders.

Read the full research report to learn more about battling insider threats

More from Threat Intelligence

Strela Stealer: Today’s invoice is tomorrow’s phish

12 min read - As of November 2024, IBM X-Force has tracked ongoing Hive0145 campaigns delivering Strela Stealer malware to victims throughout Europe - primarily Spain, Germany and Ukraine. The phishing emails used in these campaigns are real invoice notifications, which have been stolen through previously exfiltrated email credentials. Strela Stealer is designed to extract user credentials stored in Microsoft Outlook and Mozilla Thunderbird. During the past 18 months, the group tested various techniques to enhance its operation's effectiveness. Hive0145 is likely to be…

Hive0147 serving juicy Picanha with a side of Mekotio

17 min read - IBM X-Force tracks multiple threat actors operating within the flourishing Latin American (LATAM) threat landscape. X-Force has observed Hive0147 to be one of the most active threat groups operating in the region, targeting employee inboxes at scale, with a primary focus on phishing and malware distribution. After a 3-month break, Hive0147 returned in July with even larger campaign volumes, and the debut of a new malicious downloader X-Force named "Picanha,” likely under continued development, deploying the Mekotio banking trojan. Hive0147…

FYSA – Critical RCE Flaw in GNU-Linux Systems

2 min read - Summary The first of a series of blog posts has been published detailing a vulnerability in the Common Unix Printing System (CUPS), which purportedly allows attackers to gain remote access to UNIX-based systems. The vulnerability, which affects various UNIX-based operating systems, can be exploited by sending a specially crafted HTTP request to the CUPS service. Threat Topography Threat Type: Remote code execution vulnerability in CUPS service Industries Impacted: UNIX-based systems across various industries, including but not limited to, finance, healthcare,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today