Protect Sources-SD Times

Earlier this year, one of the world’s largest gaming companies, EA (Electronic Arts), cyber-sourced about 780GB of games such as its own Frostbite game engine used in FIFA 21 and many other high-end games. Reported attack and theft. Profile games such as Battlefield. Threat actors responsible for EA’s data breaches sell stolen data for $ 28 million in underground hacking forums, giving potential buyers “full ability to exploit all EA services” I promised that.

Unfortunately for hackers, on this occasion they couldn’t find a buyer or force money directly from the EA, so they simply dumped their cargo in an underground forum. In a statement, EA said there was no evidence that player privacy was at stake and was working with law enforcement authorities as part of an ongoing criminal investigation.

But the victims of the game aren’t just EA, but unfortunately they will follow. Hackers recently stole the source code for Cyberpunk 2077 and The Witcher 3 CD Project Red, and in July 2020, Nintendo’s source code for games such as Super Mario Kart and the unreleased Zelda game was released. Being able to see the internal workings of a game or engine, as well as short-term financial motivation, can help hackers create cheats and cracks. The impact of this reputation among gamers, investors, and third parties can result in long-term damage to trust and profits.

Source code is a big problem for software companies, whether it’s a popular computer game or a business application. It is the core of their intellectual property, and losing control over it puts their business and customers at risk. In a recent SolarWinds attack, hackers have successfully inserted malicious code into the Orion software of companies used by thousands of organizations and governments around the world to monitor their networks and infrastructure. The malicious code was incorrectly distributed to customers as an update or patch by SolarWinds.

In an interview with the news website on Motherboard, a representative of the criminal group behind the EA attack said it bought a stolen authentication cookie for EA’s internal Slack channel from the Dark Web Marketplace called Genesis for $ 10. rice field. It then used cookies to imitate EA workers to access the company’s Slack channel, and then tricked IT support workers into granting access to the company’s internal code repository.

Israeli cybersecurity firm Cyberpion said it notified EA at the end of last year about a vulnerability that made multiple domains and other assets freely available.

One of the problems is that large-scale software development is a complex process involving multiple sites, teams, and tools. The flagship tool for software developers is an integrated development environment (IDE) such as NetBeans, which helps you write properly designed and formatted code. Popular collaboration tools such as GitHub also help development teams collaborate, collaborate, reuse useful code segments, and manage the entire process.

Often, the code itself is kept on the cloud server, but the actual coding process, as in most cases, takes place on the user’s endpoint machine.

This decentralized collaboration environment provides a significant attack surface to protect against multiple attack vectors, such as phishing, social engineering, compromised user accounts, and website download drives. Second, there are infrastructure vulnerabilities such as unpatched servers and insecure FTP servers. And don’t forget the frustrated and financially motivated employees who could steal the code directly.

Time to focus on data

Traditionally, data (in this case, source code) has been sought to be protected by multiple layers of security to prevent hackers and unauthorized insiders from accessing the data. However, the constant flow of headlines about successful cyberattacks from EA to SolarWinds proves that this isn’t working. So if you can’t keep cybercriminals out or trust the people around you, rethink traditional “castle and moat” protection methods and data-centric security with valuable source code embedded in the data itself. You need to take an approach.

Technologies such as full disk encryption protect your data when it is stored on a hibernate hard disk or USB stick. This is great if a software developer loses his laptop, but it doesn’t help at all in protecting his data from unauthorized access or ongoing theft. Development system. Therefore, your data must be protected not only when it is stored, but also during transfer, copying and use, on your site or in the cloud.

The problem is that this level of encryption is complex, costly, and is believed to have a negative impact on performance and productivity, so to encrypt only the “most important” or “sensitive” data. Is to be used only. However, determining what is important and sensitive and finding out where it is stored is not an easy task.

In a recent Ponemon report, 67% of respondents said finding where sensitive data is in their organization is the biggest challenge in planning and implementing a data encryption strategy. The report also found that 31% said it was difficult to classify the data to be encrypted.

Too much balance for automation can lead to misclassification of sensitive information. Also, giving users too many choices can lead to misclassification of data. After all, people tend to do the simplest things and don’t necessarily have to do the safest things.

However, advances in technology and fast processing speeds have made it possible to use seamless data encryption to protect all structured and unstructured data. In this way, the classification for data security purposes becomes irrelevant, the stolen information remains protected, and is useless to cybercriminals.

In the case of EA or CD Projekt, hackers would have been disappointed when they realized that the stolen data was already encrypted and useless. There is no data or ransom.

Protect Sources-SD Times

Source link Protect Sources-SD Times

Show More

Related Articles

Back to top button