手机APP下载

您现在的位置: 首页 > 在线广播 > PBS高端访谈 > PBS访谈社会系列 > 正文

PBS高端访谈:为什么黑客会将目标锁定在保险公司?

来源:pbs 编辑:max   可可英语APP下载 |  可可官方微信:ikekenet
 下载MP3到电脑  批量下载MP3和LRC到手机
加载中..

JUDY WOODRUFF: Today's disclosure of a major hacking attack on the nation's second-largest health insurer, Anthem, is setting off alarms about cyber-crime at a new level.

Hackers were able to crack a database that included records for 80 million people. The cyber-criminals were able to get names, addresses and e-mails, as well as Social Security numbers and income. But hospital and doctor information related to patients wasn't hacked.

Bloomberg News reported that investigators believe Chinese state-sponsored hackers are involved.

Mark Bower is a noted expert on these issues. He's also a vice president at Voltage Security in California.

Mark Bower, welcome.

So, compared to the hacks we have seen until now, how serious is this one?

MARK BOWER, Voltage Security: Well, certainly, we have just started the year off with a bang in terms of data breaches; 80 million records is a very substantial amount, so this is quite a serious attack

And the nature of the data, you have got lots of personal data that can potentially be monetized. It's going to be very inconvenient for those individuals and also quite costly for the organization that this affects.

JUDY WOODRUFF: It is possible to know at this point who is behind this? You — we mentioned the Bloomberg news report that it's potentially the Chinese. They mentioned a group called Deep Panda.

MARK BOWER: It's not clear yet. We only have a couple data points on information like that.

But, fundamentally, there's got to be some organized crime behind this or very well-organized attackers to be able to get into these types of systems and steal this volume of data. And we shouldn't forget that these types of attacks are pretty much expected these days.

We have seen breaches of this nature across the board over the last decade. And, in fact, the volumes of data that have been stolen are actually staggering these days.

JUDY WOODRUFF: What can the people behind this data breach do with this information?

MARK BOWER: So, it depends on the — their motive in the end. But, ultimately, if you have stolen large amounts of personal information, whether you have got Social Security numbers, name and address, date of birth, all that kind of stuff — and in this case, it seems like there's also employment history and income data — well, you can start to create identity theft situations, where you're actually stealing people's information or identity to commit fraud.

But, more importantly, there is also the risk of side effects, that this type of data can actually result in attacks that are more targeted. So, for example, we might have an individual that is maybe a wealthy individual, and the attacker can go now after them more specifically based on the information that they have about them in what we call a spear phishing attack.

And that might involve going after them with targeted e-mails, even phone calls, to try and get them to reveal more data that then can be used in a compromise or for further identity theft.

JUDY WOODRUFF: So for individuals who either now or did have health coverage through Anthem, what should they be on the lookout for?

MARK BOWER: So, after these types of attacks, what we often see is a wave of spam e-mails. Those are those fake e-mails that are often trying to lure people into Web sites where there may be viruses and malware, the more sinister phishing attacks, which might be there to lure people to Web sites to then download malware that will actually steal further information from their own personal computers or maybe even get into their bank accounts and so on with online banking.

So people have to be vigilant to make sure that they're not seeing e-mails that look suspicious and clicking on things there. And also be wary of things like phone calls, for instance, from organizations that may be purporting to be from service providers that may be related to Anthem, but they're actually criminal gangs trying to get more information from consumers that can then be used for further fraud or accessing their bank account or accessing their computers and so on.

JUDY WOODRUFF: Just quickly, Mark Bower, how would you rank or rate the security system at a company like Anthem? I mean, obviously, it was breached, but had they taken all the steps that a big company is supposed to take?

MARK BOWER: That's hard to say.

But even the best-prepared organizations can often succumb to these types of attacks. What we have found over the last several years is that the attackers are becoming much more sophisticated. The malware is becoming much more advanced. And it just takes one vulnerability to be able to bypass those traditional perimeter defenses, the firewalls and the log-in and the intrusion detection, to get into the heart of these systems.

And once they're in there, it's too late. The information can be stolen, monetized. And we see victims, as we have seen today.

JUDY WOODRUFF: Well, it's certainly got a lot of people's attention.

Mark Bower with Voltage Security, we thank you.

MARK BOWER: Thank you very much.

重点单词   查看全部解释    
involve [in'vɔlv]

想一想再看

vt. 包含,使陷入,使忙于,使卷入,牵涉

联想记忆
advanced [əd'vɑ:nst]

想一想再看

adj. 高级的,先进的

 
vigilant ['vidʒilənt]

想一想再看

adj. 警醒的,警戒著的,警惕的

联想记忆
spear [spiə]

想一想再看

n. 矛(正负电子对撞机)
vt 用矛刺

 
suspicious [səs'piʃəs]

想一想再看

adj. 可疑的,多疑的

联想记忆
identity [ai'dentiti]

想一想再看

n. 身份,一致,特征

 
security [si'kju:riti]

想一想再看

n. 安全,防护措施,保证,抵押,债券,证券

 
breach [bri:tʃ]

想一想再看

n. 裂口,破坏,违背,(浪的)冲击,决裂
v

联想记忆
traditional [trə'diʃənəl]

想一想再看

adj. 传统的

 
perimeter [pə'rimitə]

想一想再看

n. 周长,周界,边缘

联想记忆

发布评论我来说2句

    最新文章

    可可英语官方微信(微信号:ikekenet)

    每天向大家推送短小精悍的英语学习资料.

    添加方式1.扫描上方可可官方微信二维码。
    添加方式2.搜索微信号ikekenet添加即可。