Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/26/2017
03:00 PM
50%
50%

30% of Major CEOs Have Had Passwords Exposed

One in three CEOs have had passwords leaked through online services where they registered with a corporate email address.

Thirty percent of CEOs at top global companies have had their passwords leaked through online services where they used their corporate email addresses to register, as discovered a new study by F-Secure. When a service is hacked and a leader's password for the service is exposed, it increases the likelihood for targeted cyberattacks.

Researchers studied company email addresses for CEOs representing more than 200 of the biggest companies across ten countries. They discovered 81% of those leaders have had some form of personal information, such as email address, phone number, address, or birthdate, leaked through spam lists and exposed marketing databases.

The most common previously breached services associated with company email addresses were LinkedIn (53%) and Dropbox (18%). Countries with the greatest amount of CEO information exposed include the USA, the UK, and the Netherlands, all at 95%.

Read more details here.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
10/27/2017 | 7:40:12 AM
Ill Advised
I will never understand why people will use their corporate emails for anything non-work related. Email addresses are FREE. Why run the risk?
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
10/27/2017 | 8:20:41 AM
Re: Ill Advised
You have answered your own question.  Most people DON'T KNOW THE RISKS that are out there and have a vague trust that corporate data is behind SECURE walls.  (See footnote for Equifax).  We understand the risk as security and IT professionals. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/27/2017 | 12:55:41 PM
Part of the game
 

This is part of the game. CEO use their emails for any site sand they have a very simple password defined and they never change it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/27/2017 | 12:56:42 PM
Re: Ill Advised
"use their corporate emails"

Partially because they may want to keep their personal email secure :--))
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/27/2017 | 12:57:43 PM
Re: Ill Advised
"Email addresses are FRE"

This is true but I do not think, CEOs can manage more than one email.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/27/2017 | 12:59:06 PM
Re: Ill Advised
"DON'T KNOW THE RISKS"

I agree, I also add, they also do not care. Until they experience a big attack then they are out of business, it would not matter anyway.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/27/2017 | 1:00:52 PM
Re: Ill Advised
"See footnote for Equifax"

I think Equifax knew what they were doing, they just did not want to spend enough money to go through the trouble of keeping systems up to date.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
10/27/2017 | 1:56:47 PM
Re: Ill Advised
Do not limit this to CEO territory either ---- you can include layers of management down the line up to and including standard users - staff in other words.  And by doing so, a whole new layer of endpoint infections come ot light.  Password complexity is another issue too --- hard to crack, easy to remember is the KEY to good password management and DO NOT use the same one for everything.    But WE know that and most people DO NOT. 
Mr Phen375
50%
50%
Mr Phen375,
User Rank: Apprentice
10/28/2017 | 1:46:34 AM
Misuse of company asset
They must be educated. They cannot use company's asset (the corporate email) for private purposes. Should anything bad happens, they've got to be 100% responsible for it.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
10/31/2017 | 9:16:22 AM
Re: Ill Advised
I would hope that they don't prioritize their personal technology/data over their work technology/data because the detriments are much more catastrophic for the latter. Unfortunately you may be right...
Page 1 / 2   >   >>
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Botnet Infects Hundreds of Thousands of Websites
Robert Lemos, Contributing Writer,  10/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8260
PUBLISHED: 2020-10-28
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.
CVE-2020-8261
PUBLISHED: 2020-10-28
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection.
CVE-2020-8262
PUBLISHED: 2020-10-28
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure below 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) and Open Redirection for authenticated user web interface.
CVE-2020-8263
PUBLISHED: 2020-10-28
A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) through the CGI file.
CVE-2020-8239
PUBLISHED: 2020-10-28
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.