Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

6/18/2015
05:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Houston Astros' Breach A 'Wake-Up Call' On Industrial Cyber Espionage

The St. Louis Cardinals' alleged breach of the Astros' proprietary database raises concern over the possibility of US companies hacking their rivals for intel.

Cyber espionage traditionally has been the domain of nation-states spying for intelligence-gathering and stealing intellectual property, but the recent cyber-theft of information from the Houston Astros baseball team's proprietary scouting and team information database sheds light on the prospect of business-on-business cyberspying.

The breach of the Astros' database allegedly by members of the St. Louis Cardinals organization was a rare case, exposing one organization cyberspying on another; security experts say it's the first such attack in the sports world that has come to light. But competitive intelligence-gathering and spying -- whether it's casual conversations with a competitor, shoulder-surfing, deciphering a team manager's signals in mid-game, or even extreme cases like bugging conference rooms -- long have been a real threat and concern among corporations and sports organizations, experts say.

It should come as no surprise that industrial cyber espionage would become a nefarious option for companies outside the nation-state realm to keep tabs on, or to gain a competitive advantage over, rivals in their industry, security experts say.

"The recent focus on anything cyber espionage-related fingers overseas [threats] and foreign group attacks against the US" and others, says Nick Pelletier, senior consultant with incident response firm Mandiant, a FireEye company. "There's not a lot of discussion on things such as someone in the US hitting someone else in the US" to date.

"This is a wake-up call," he says of the Astros' breach.

Cases of one business spying on another in the US are unusual, and nowhere near the threat or pervasiveness of nation-state cyberspying. Mandiant's Pelletier says he hasn't seen any cases of business-on-business cyber espionage as yet, but it's something the firm is tracking.

"It's something we've been sort of keeping our eye on," he says. The most common form of industrial espionage to date, he says, is a "physical" attack, whether it's bribery or an insider leaking information for profit or other reasons. Most organizations don't have the ability to pull off an actual cyberattack, anyway, he says, so old-school espionage is a more common tack.

Former FBI cyber special agent and supervisory special agent Andre McGregor says the agency has seen industrial cyber espionage cases from time to time, some of which have involved a business using nefarious hacker-for-hire services to do their dirty work. "These have been more one-off intrusions rather than the norm," accounting for a small percentage of all cyber espionage, he says.

The FBI and other law enforcement agencies have been investigating and watching hacker-for-hire operations for years now, says McGregor, who recently joined Tanium as a director of cybersecurity. These are typically nation-state hackers who "moonlight" as cyber-mercenaries, he says.

As for the Astros' breach, McGregor says,"Traditional corporate espionage has now entered cyberspace."

Meanwhile, initial reports that the breach occurred via a list of reused passwords by Astros general manager Jeff Luhnow, who worked for the Cardinals organization from 2003 until 2011 when he took the job with Houston, were shot down today, as Luhnow told Sports Illustrated that he did not use the same passwords he had used while with St. Louis. The breach itself was first discovered and publicized in June of 2014 when some data was posted online on Anonbin; this week was the first time the Cardinals organization had been publicly implicated in the FBI investigation.

Cardinals officials reportedly may have been worried that Luhnow had taken their team's proprietary information with him to the Astros, an allegation Luhnow also dismissed in his interview with SI.

Adam Meyers, vice president of intelligence at CrowdStrike, says business-on-business cyber spying is rare and definitely not at the same level of sophistication as a nation-state attack would be. "Breaking and entering" is a better way to describe the alleged attack on the Astros' database, he says. "They [reportedly] got access to information they weren't authorized to have," he says.

"Industrial espionage [itself] is a thing," Meyers says. "Businesses have sweeps of boardrooms before big meetings," for example, he points out.

What the Astros' breach illustrates is that the business side of sports organizations and all enterprises need to take cybersecurity threats more seriously, he says. "Information security isn't a computer nerd problem anymore. It's a business problem and needs to be treated as such," Meyers says. "If you are only relying on computer nerds to defend against these kinds of things," your business is at risk of attack, he says.

"You need to know from a business perspective how things are going to impact you," he says.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Mohan Koo
100%
0%
Mohan Koo,
User Rank: Author
9/9/2015 | 1:56:14 PM
Sports Security Must Be Up to Snuff in the Digital Age
Cybersecurity tools and measures that are regularly implemented to protect sensitive IP in the technology and automotive industries could have easily alerted St. Louis that potential theft was taking place when its staffers left to join Houston and this could have been averted.

Rather, we have a case of spiteful employees angry at an ex-boss and looking to exact revenge. This shows that malice and a little bit of tech-savviness can damage an entire organization's competitive edge through a single intrusion into a rival team's network. 
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4147
PUBLISHED: 2019-09-16
IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 158413.
CVE-2019-5481
PUBLISHED: 2019-09-16
Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
CVE-2019-5482
PUBLISHED: 2019-09-16
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
CVE-2019-15741
PUBLISHED: 2019-09-16
An issue was discovered in GitLab Omnibus 7.4 through 12.2.1. An unsafe interaction with logrotate could result in a privilege escalation
CVE-2019-16370
PUBLISHED: 2019-09-16
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.