Houston Astros' Breach A 'Wake-Up Call' On Industrial Cyber Espionage
The St. Louis Cardinals' alleged breach of the Astros' proprietary database raises concern over the possibility of US companies hacking their rivals for intel.
June 18, 2015
Cyber espionage traditionally has been the domain of nation-states spying for intelligence-gathering and stealing intellectual property, but the recent cyber-theft of information from the Houston Astros baseball team's proprietary scouting and team information database sheds light on the prospect of business-on-business cyberspying.
The breach of the Astros' database allegedly by members of the St. Louis Cardinals organization was a rare case, exposing one organization cyberspying on another; security experts say it's the first such attack in the sports world that has come to light. But competitive intelligence-gathering and spying -- whether it's casual conversations with a competitor, shoulder-surfing, deciphering a team manager's signals in mid-game, or even extreme cases like bugging conference rooms -- long have been a real threat and concern among corporations and sports organizations, experts say.
It should come as no surprise that industrial cyber espionage would become a nefarious option for companies outside the nation-state realm to keep tabs on, or to gain a competitive advantage over, rivals in their industry, security experts say.
"The recent focus on anything cyber espionage-related fingers overseas [threats] and foreign group attacks against the US" and others, says Nick Pelletier, senior consultant with incident response firm Mandiant, a FireEye company. "There's not a lot of discussion on things such as someone in the US hitting someone else in the US" to date.
"This is a wake-up call," he says of the Astros' breach.
Cases of one business spying on another in the US are unusual, and nowhere near the threat or pervasiveness of nation-state cyberspying. Mandiant's Pelletier says he hasn't seen any cases of business-on-business cyber espionage as yet, but it's something the firm is tracking.
"It's something we've been sort of keeping our eye on," he says. The most common form of industrial espionage to date, he says, is a "physical" attack, whether it's bribery or an insider leaking information for profit or other reasons. Most organizations don't have the ability to pull off an actual cyberattack, anyway, he says, so old-school espionage is a more common tack.
Former FBI cyber special agent and supervisory special agent Andre McGregor says the agency has seen industrial cyber espionage cases from time to time, some of which have involved a business using nefarious hacker-for-hire services to do their dirty work. "These have been more one-off intrusions rather than the norm," accounting for a small percentage of all cyber espionage, he says.
The FBI and other law enforcement agencies have been investigating and watching hacker-for-hire operations for years now, says McGregor, who recently joined Tanium as a director of cybersecurity. These are typically nation-state hackers who "moonlight" as cyber-mercenaries, he says.
As for the Astros' breach, McGregor says,"Traditional corporate espionage has now entered cyberspace."
Meanwhile, initial reports that the breach occurred via a list of reused passwords by Astros general manager Jeff Luhnow, who worked for the Cardinals organization from 2003 until 2011 when he took the job with Houston, were shot down today, as Luhnow told Sports Illustrated that he did not use the same passwords he had used while with St. Louis. The breach itself was first discovered and publicized in June of 2014 when some data was posted online on Anonbin; this week was the first time the Cardinals organization had been publicly implicated in the FBI investigation.
Cardinals officials reportedly may have been worried that Luhnow had taken their team's proprietary information with him to the Astros, an allegation Luhnow also dismissed in his interview with SI.
Adam Meyers, vice president of intelligence at CrowdStrike, says business-on-business cyber spying is rare and definitely not at the same level of sophistication as a nation-state attack would be. "Breaking and entering" is a better way to describe the alleged attack on the Astros' database, he says. "They [reportedly] got access to information they weren't authorized to have," he says.
"Industrial espionage [itself] is a thing," Meyers says. "Businesses have sweeps of boardrooms before big meetings," for example, he points out.
What the Astros' breach illustrates is that the business side of sports organizations and all enterprises need to take cybersecurity threats more seriously, he says. "Information security isn't a computer nerd problem anymore. It's a business problem and needs to be treated as such," Meyers says. "If you are only relying on computer nerds to defend against these kinds of things," your business is at risk of attack, he says.
"You need to know from a business perspective how things are going to impact you," he says.
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024