Governments, corporations and cybersecurity experts are still reeling after getting a taste of the most widespread ransomware attack to date. Only a few weekends ago, over 200,000 computers in 99 countries were hit by the unprecedented “Wanna” ransomware attack, also known as: WannaCry, WCry, WanaCrypt and WanaCrypt0r.
The British National Health Service was the first to report the attack, after several of its systems had been hit. Later, Spain’s largest telecommunications company Telefonica, and French carmakers Renault also admitted to being hit – among other government agencies, global organizations and corporations.
The WannaCry attack is a new one. But still one of the largest breaches in history, the 2014 JP Morgan Data Breach affected tens of millions of people, and seven million businesses—a total of 83 million customers. Five individuals used malware, social engineering, and spear-phishing attacks to plunder emails, addresses, phone numbers, SSNs, and other customer information, not just from JP Morgan itself, but other related financial institutions around the same time.
The swiftness in which the attack spread, and the fact that it easily infiltrated systems that are supposed to be responsible for our safety is particularly troubling: if hospitals and car manufacturers’ applications can get exploited so easily – financial data applications should not be any different, vulnerability wise.
The 2016 Financial Industry Cybersecurity Report summarized it all saying that Cybercrime has jumped to the second most reported economic crime in PWC’s Global Economic Crime Survey and financial institutions are prime targets. As cyber criminals find new ways to attack, breach, and exploit organizations, threat patterns such as phishing, spear-phishing, and social engineering evolve and become more sophisticated.
The 2016 Financial Industry Cybersecurity Report further lists the following findings:
The report authors summarize it all by saying that financial organizations need solutions that assess vulnerabilities and their vendor’s vulnerabilities in real-time.
Understanding today’s application security challenges, one may want to acknowledge that software composition has changed fundamentally in recent years. A software program today typically consists of proprietary code, open source components and commercial libraries, while open source has become the most dominant part.
Forrester’s latest ‘software composition analysis’ report estimates that 60 to 80 percent of the average software product are open source components. Although open source has been central to increasing software developers’ productivity, it has also introduced new challenges into the software development process. The problem is most software development and security teams have not adapted well to handle these new challenges.
That’s why it’s important to make sure you:
We’d love to hear your thoughts! How are you adapting to security challenges introduced by open source - and more importantly what processes have you introduced?
Patricia Johnson is an Open Source Security and Licensing Expert at WhiteSource.