Lessons From the Goldcorp Extortion

Unfortunately, another breach has made the headlines and it’s déjà vu all over again. The narrative surrounding the Goldcorp breach is similar to other doxing attacks: Attackers appear to have...
Michael Buckbee
1 min read
Last updated October 21, 2021

Unfortunately, another breach has made the headlines and it’s déjà vu all over again. The narrative surrounding the Goldcorp breach is similar to other doxing attacks:

  • Attackers appear to have had undetected access to confidential information for months,
  • Sensitive files and emails were stolen,
  • And multiple GBs of data were exfiltrated without sounding an alarm.

The hackers in the Goldcorp incident claim they have emails showing corporate racism and sexism. But they were not entirely motivated by ideology. Instead, they also asked for money to not release the 1.8 GB of data they say is in their possession.

The hack also resulted in personal information about employees (ids, passwords, salaries) being disclosed.

The CEO of Goldcorp, a Vancouver-based mining company, points out that because they’re a public company, sensitive data is automatically in the public domain.

In any case, the breach underscores yet again the need to monitor access to confidential documents and mailboxes as if they were bank accounts.

And this incident is on top of the hacking of U.S. Steel for its IP involved in lightweight steel technology.

Our opinion on all this?

Perimeter defenses will not stop hackers from getting in. Period.

You’ll need to monitor file and other system activities. And the most effective way to interpret this activity is to compare it against a baseline, and use that to decide who’s a hacker (or insider), and who’s doing legitimate work.

In other words, you need User Behavior Analytics or UBA.

Got UBA? Learn more about how tracking behaviors can help mitigate your breach risks.

 

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

what-is-the-cyber-kill-chain-and-how-to-use-it-effectively
What is The Cyber Kill Chain and How to Use it Effectively
The cyber kill chain maps the stages of a cyberattack from the early reconnaissance stages to data exfiltration. The cyber kill chain helps us understand and combat ransomware, security breaches, and advanced persistent attacks (APTs).
brute-force:-anatomy-of-an-attack
Brute Force: Anatomy of an Attack
The media coverage of NotPetya has hidden what might have been a more significant attack: a brute force attack on the UK Parliament.  While for many it was simply fertile...
what-is-a-whaling-attack?
What is a Whaling Attack?
A whaling attack specifically targets senior management in an organization such as the CEO, CFO, or other executives, hoping to leverage their authority to gain access to sensitive data. Discover everything you need to know about this attack including tips for avoiding one with our guide.
top-5-remote-work-security-threats
Top 5 Remote Work Security Threats
COVID-19 threw us all a curveball, and attackers are rushing to take advantage of the increased attack surface. Varonis can help protect your remote workforce and data now and in better times.