venturebeat.com Open in urlscan Pro
192.0.66.2  Public Scan

Submitted URL: http://t.rsbn4.com/t.aspx/subid/993822770/camid/1819258/linkid/16995201/Default.aspx
Effective URL: https://venturebeat.com/security/gemini-uber-data-breaches/
Submission: On February 01 via manual from PH — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://venturebeat.com/

<form method="get" action="https://venturebeat.com/" class="search-form" id="nav-search-form">
  <input id="mobile-search-input" class="" type="text" placeholder="Search" name="s" aria-label="Search" required="">
  <button type="submit" class="">
    <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
      <g>
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M14.965 14.255H15.755L20.745 19.255L19.255 20.745L14.255 15.755V14.965L13.985 14.685C12.845 15.665 11.365 16.255 9.755 16.255C6.16504 16.255 3.255 13.345 3.255 9.755C3.255 6.16501 6.16504 3.255 9.755 3.255C13.345 3.255 16.255 6.16501 16.255 9.755C16.255 11.365 15.665 12.845 14.6851 13.985L14.965 14.255ZM5.255 9.755C5.255 12.245 7.26501 14.255 9.755 14.255C12.245 14.255 14.255 12.245 14.255 9.755C14.255 7.26501 12.245 5.255 9.755 5.255C7.26501 5.255 5.255 7.26501 5.255 9.755Z">
        </path>
      </g>
    </svg>
  </button>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products. With your
permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may click to refuse
to consent or access more detailed information and change your preferences
before consenting. Please note that some processing of your personal data may
not require your consent, but you have a right to object to such processing.
Your preferences will apply to this website only. You can change your
preferences at any time by returning to this site or visit our privacy policy.
MORE OPTIONSDISAGREEAGREE

Skip to main content
Events Special Issues
VentureBeat Homepage

Subscribe

 * Artificial Intelligence
   * View All
   * AI, ML and Deep Learning
   * Auto ML
   * Data Labelling
   * Synthetic Data
   * Conversational AI
   * NLP
   * Text-to-Speech
 * Security
   * View All
   * Data Security and Privacy
   * Network Security and Privacy
   * Software Security
   * Computer Hardware Security
   * Cloud and Data Storage Security
 * Data Infrastructure
   * View All
   * Data Science
   * Data Management
   * Data Storage and Cloud
   * Big Data and Analytics
   * Data Networks
 * Automation
   * View All
   * Industrial Automation
   * Business Process Automation
   * Development Automation
   * Robotic Process Automation
   * Test Automation
 * Enterprise Analytics
   * View All
   * Business Intelligence
   * Disaster Recovery Business Continuity
   * Statistical Analysis
   * Predictive Analysis
 * More
   * Data Decision Makers
   * Virtual Communication
     * Team Collaboration
     * UCaaS
     * Virtual Reality Collaboration
     * Virtual Employee Experience
   * Programming & Development
     * Product Development
     * Application Development
     * Test Management
     * Development Languages


Subscribe Events Special Issues



GEMINI, UBER DATA BREACHES SHOW THIRD-PARTY RISK CAN’T BE IGNORED 

Tim Keary@tim_keary
December 16, 2022 10:37 AM
 * Share on Facebook
 * Share on Twitter
 * Share on LinkedIn

Image Credit: Shutterstock

Check out all the on-demand sessions from the Intelligent Security Summit here.

--------------------------------------------------------------------------------



Third-party risk is one of the most overlooked threats in enterprise security.
Research shows that over the past 12 months, 54% of organizations have suffered
data breaches through third parties. This week alone, both Uber and
cryptocurrency exchange Gemini have been added to that list.

Most recently, Gemini suffered a data breach after hackers breached a
third-party vendor’s systems and gained access to 5.7 million emails and
partially obfuscated phone numbers.  

In a blog post reflecting on the breach, Gemini acknowledged that while no
account information or systems were impacted as a result, some customers may
have been targeted by phishing campaigns following the breach. 

1
/
6
Internal threats that create external attack opportunities and how to combat
them
Read More

137.1K
5




Video Player is loading.
Play Video
Unmute

Duration 0:00
/
Current Time 0:00
Playback Speed Settings
1x
Loaded: 0%

0:00

Remaining Time -0:00
 
FullscreenPlayUp Next

This is a modal window.



Beginning of dialog window. Escape will cancel and close the window.

TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque
Font Size50%75%100%125%150%175%200%300%400%Text Edge
StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional
Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall
Caps
Reset restore all settings to the default valuesDone
Close Modal Dialog

End of dialog window.

Share
Playback Speed

0.25x
0.5x
1x Normal
1.5x
2x
Replay the list

TOP ARTICLES






 * Powered by AnyClip
 * Privacy Policy



Internal threats that create external attack opportunities and how to combat
them
NOW PLAYING
UP NEXT
Optimizing security strategies during an acute talent shortage
NOW PLAYING
UP NEXT
Becoming Secure by Design
NOW PLAYING
UP NEXT
Investing in technologies and people to defend financial institutions
NOW PLAYING
UP NEXT
Rebuilding cybersecurity threat detection and response
NOW PLAYING
UP NEXT
Identifying and mitigating the most critical security risks
NOW PLAYING
UP NEXT


Internal threats that create external attack opportunities and how to combat
them


While the information exposed in the Gemini breach is limited to emails and
partial phone numbers, the hack highlights that targeting third-party vendors is
a reliable way for threat actors to gather information to use in social
engineering scams and other attacks. 


WHY THIRD PARTIES ARE AN EASY TARGET FOR DATA BREACHES

In the case of the Uber breach, hackers first gained access to Teqtivity’s
internal systems and an AWS server, before exfiltrating and leaking the account
information and Personally Identifiable Information (PII) of roughly 77,000 Uber
employees.


EVENT

Intelligent Security Summit On-Demand

Learn the critical role of AI & ML in cybersecurity and industry specific case
studies. Watch on-demand sessions today.

Watch Here

Although the Uber and Gemini breaches are separate incidents, the two
organizations have been left to pick up the pieces and run damage control after
a third-party vendor’s security protections failed. 

advertisement


“In the grand scheme of things, lost email addresses aren’t the worst data
element to be used; however, it is a stark reminder that enterprises are still
going to take heat for breaches that (allegedly) occur with their third-party
vendors,” said Netenrich principal threat hunter John Bambenek. 

When considering these incidents amid the wider trend of third-party breaches,
it appears that threat actors are well aware that third-party vendors are a
relatively simple entry point to downstream organizations’ systems. 

After all, an organization not only has to trust their IT vendors’ security
measures and hand over control of their data, they also have to be confident
that the vendors will report cybersecurity incidents when they occur. 

Unfortunately, many organizations are working alongside third-party vendors they
don’t fully trust, with only 39% of enterprises confident that a third party
would notify them if a data breach originated in their company. 


THE RISKS OF LEAKED EMAILS: SOCIAL ENGINEERING 

advertisement


Although email addresses aren’t as damaging when released as passwords or
intellectual property, they do provide cybercriminals with enough information to
start targeting users with social engineering scams and phishing emails. 

“While this specific instance [the Gemini breach] involves a cryptocurrency
exchange, the takeaway is that of a much more general problem [with] threat
actors gaining target information (emails, phone numbers) and some context on
that information (they all use a specific service) to make it relevant,” said
Mike Parkin, senior technical engineer at cyber risk remediation provider Vulcan
Cyber. 

“Random emails are fine if you are shotgunning Nigerian Prince scams, but to
deliver more focused cast-net attacks that target a specific organization or
user community, having that context is threat-actor gold,” Parkin said.

In the future, fraudsters will be able to use these email addresses to draw up
highly-targeted phishing campaigns and crypto scams to try to trick users into
logging into fake exchange sites or handing over other sensitive information. 


THE ANSWER: THIRD-PARTY RISK MITIGATION 

advertisement


One way organizations can begin to mitigate third-party risk is to review vendor
relationships and assess the impact they have on the organization’s security
posture. 

“Organizations need to understand where they could be exposed to vendor-related
risk and put in place consistent policies for re-evaluating those
relationships,” said Bryan Murphy, senior director of consulting services and
incident response at CyberArk. 

At a fundamental level, enterprises need to start considering third-party
vendors as an extension of their business, and take ownership so that necessary
protections are in place to secure data assets. 

For Bambenek, the most practical way CISOs can do this is to embed security at
the contract level.

“CISOs need to make sure at least their contracts are papered to impose
reasonable security requirements and they used third-party risk monitoring tools
to assess compliance. The more sensitive the data, the stronger the requirements
and monitoring need to be,” said Bambenek. 

While these measures won’t eliminate the risks of working with a third party
entirely, they will afford organizations additional protections and highlight
that they’ve done their due diligence in protecting customer data. 

VentureBeat's mission is to be a digital town square for technical
decision-makers to gain knowledge about transformative enterprise technology and
transact. Discover our Briefings.




INTELLIGENT SECURITY SUMMIT ON-DEMAND

Did you miss a session at Intelligent Security Summit? Head over to the
on-demand library to hear insights from experts and learn the importance of
cybersecurity in your organization.

Watch Here


 * VentureBeat Homepage
 * Follow us on Facebook
 * Follow us on Twitter
 * Follow us on LinkedIn
 * Follow us on RSS

 * Press Releases
 * Contact Us
 * Advertise
 * Share a News Tip
 * Contribute to DataDecisionMakers

 * Careers
 * Privacy Policy
 * Terms of Service
 * Do Not Sell My Personal Information

© 2023 VentureBeat. All rights reserved.