Reports surfaced in April 2016 indicating that the personal information of children vaccinated at hospitals in China was posted for sale. The data, including home address and parent contact information, was obtained in part through unauthorized access and in part by malicious insiders who collaborated with attackers.

This is just one of the many examples involving insider attacks globally. According to the recently published “IBM X-Force 2016 Cyber Security Intelligence Index,” 60 percent of all attacks in 2015 were carried out by insiders. They either had malicious intent or served as inadvertent actors — insiders who either mistakenly allow an attacker access to data or fail to pay attention to cybersecurity policies.

What Do Malicious Insiders Want?

Why is your seemingly trustworthy employee, contractor, client or business partner targeting your organization? There are a number of motives behind cyberattacks as detailed in the IBM report “Know Your Cyber Enemy.”

We know that profit is the driver behind the most active areas of cybercrime. Malicious insiders, however, could also be encouraged by a nation-state to perform espionage.

Revenge is another possibility. For example, a disgruntled ex-employee with active credentials cloud access a target’s resources, or maybe he or she has retained corporate documents that could be sold or made public.

Read the complete IBM X-Force 2016 Cyber Security Intelligence Index

Is There Good News?

There is good news! Interestingly, this year’s data revealed that while insider attacks accounted for 60 percent of all security incidents in 2015, up from 55 percent in 2014, roughly one-third of those attacks were carried out by inadvertent actors. In comparison, these unwilling cohorts contributed to nearly half of all attacks in 2014.

What does this mean? Well, it could mean there were fewer “Oops, I didn’t mean to misconfigure a public-facing server to allow search engines to crawl and index corporate data!” Or fewer “Oops, I didn’t mean to click on that malicious attachment that downloaded malware and provided attackers access to hundreds of customer records!” You get the picture.

How to Prevent Insider Attacks

A reduction in the number of attacks attributed to inadvertent actors could mean that more organizations are implementing security policies and employee education. They’re doing a better job of communicating what’s expected and why it’s important.

In addition to security policies and employee education, there are a number of solutions that can mitigate the insider threat. Products that monitor behavior and provide anomaly detection are key. Focusing on access management, specifically privileged identity management (PIM), is an important step toward preventing data breaches.

Organizations can go a long way toward an effective defense against malicious insiders by implementing complete data life cycle management. This should help them do a better job of informing employees what to expect and why certain data stores need to be protected.

Download the IBM research report: Battling security threats from within your organization

More from Identity & Access

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

An IBM Hacker Breaks Down High-Profile Attacks

On September 19, 2022, an 18-year-old cyberattacker known as "teapotuberhacker" (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website GTAForums.com. Gamers got an unsanctioned sneak peek of game footage, characters, plot points and other critical details. It was a game developer's worst nightmare. In addition, the malicious actor claimed responsibility for a…