DATA MANIPULATION ATTACKS: HOW TO DETECT AND PREVENT
PCQuest|March 2020
For organizations, it’s inevitable that attackers will take data; it’s more of a challenge to determine when an attacker makes a small change to data, then leaves the scene of the crime
Tim Bandos
DATA MANIPULATION ATTACKS: HOW TO DETECT AND PREVENT

Conventional wisdom says that once an attacker is in the system, moving laterally from network to network, the damage is already done. The adversary has found a way in and more than likely identified the data they’re after. They simply need to exfiltrate it, the last step of the kill chain, to land the final blow. In some scenarios, however, it’s what the attacker doesn’t do that could have a more devastating outcome on the enterprise. Data manipulation attacks, attacks in which adversaries don’t take data but instead make subtle, stealthy tweaks to data, usually to elicit some type of gain, can be just as, if not more crippling for organizations than theft. The ability of attackers to manipulate and shift data around is a real threat –one that could cause widespread financial and even physical harm as a result if done successfully.

Consider the stock market. Hypothetically speaking, if an attacker were to successfully breach the IT systems and databases responsible for updating a stock ticker symbol and manipulate data to show a billion-dollar tech giant like Apple, Microsoft, Google, or Amazon taking a nose dive, it would cause immediate chaos and panic would ensue. It could result in people selling off their stocks in frenzy–the culmination of a deliberate and effective attack.

Data manipulation attacks don’t always have to result in a tangible financial gain. If an attacker managed to carry out a similar attack against health record information for patients in hospitals and altered critical data like drug dosages and prescriptions that need to be administered, it could result in sickness or even death.

This story is from the March 2020 edition of PCQuest.

Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 9,000+ magazines and newspapers.

This story is from the March 2020 edition of PCQuest.

Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 9,000+ magazines and newspapers.

MORE STORIES FROM PCQUESTView All
Revolutionizing The Future Of Machine Learning
PCQuest

Revolutionizing The Future Of Machine Learning

Quantum algorithms will revolutionize machine learning by end of this decade, significantly enhancing optimization and pattern recognition, with potential breakthroughs in drug discovery and materials science

time-read
2 mins  |
August 2024
How to choose the best gaming smartphone in 2024
PCQuest

How to choose the best gaming smartphone in 2024

Discover the essential features and top picks for gaming smartphones in 2024, ensuring every gamer can find the perfect device to enhance their mobile gaming experience

time-read
7 mins  |
August 2024
BOSTON LEVIN Storm AIRMAX Earbuds
PCQuest

BOSTON LEVIN Storm AIRMAX Earbuds

In the ever-evolving world of wireless audio technology, the Boston Levin Storm AIRMAX earbuds emerge as a promising contender, especially given their current promotional pricing.

time-read
2 mins  |
August 2024
WearPods
PCQuest

WearPods

The WatchOut WearPods is an innovative smartwatch that stands out by integrating True Wireless Stereo (TWS) earbuds into its design. Priced at ₹5,999, this device offers a blend of fitness tracking, music storage, and smart features aimed at the modern, on-the-go individual.

time-read
2 mins  |
August 2024
Safeguarding data in the age of AI and digitalization
PCQuest

Safeguarding data in the age of AI and digitalization

Cybersecurity is critical for GCCs in fintech, facing evolving threats like AI-powered attacks and ransomware. GCCs are adopting AI-driven defenses, zero-trust architecture, and quantum-resistant cryptography while enhancing employee training to protect against these risks

time-read
2 mins  |
August 2024
The power of observability in decrypting cyber threats
PCQuest

The power of observability in decrypting cyber threats

Cybersecurity is critical for GCCs in fintech, facing evolving threats like AI-powered attacks and ransomware. GCCs are adopting AI-driven defenses, zero-trust architecture, and quantum-resistant cryptography while enhancing employee training to protect against these risks

time-read
3 mins  |
August 2024
The role of audio quality in effective business communication: Why every word matters
PCQuest

The role of audio quality in effective business communication: Why every word matters

High-quality audio is crucial for effective business communication in the digital age. Investing in superior audio tech enhances communication and offers a competitive edge. Focus on audio quality in calls and presentations—it’s key to understanding, connecting, and succeeding

time-read
4 mins  |
August 2024
How cloud computing and AI chips are shaping the future of data management
PCQuest

How cloud computing and AI chips are shaping the future of data management

Data is rapidly growing, expected to hit 175 zettabytes by 2025. Cloud computing and AI chips are transforming data management, offering scalable storage, high availability, and enhanced processing. Companies like Netflix and Amazon leverage these technologies to handle data efficiently, ensuring future success

time-read
4 mins  |
August 2024
How electric vehicles are redefining environmental responsibility
PCQuest

How electric vehicles are redefining environmental responsibility

India’s EV sales soared past one million in 2023, driven by eco-conscious consumers, government initiatives, and urban innovation. With rapid industry growth, expanding charging networks, advancing battery tech, and ensuring affordability are crucial for sustaining this momentum

time-read
3 mins  |
August 2024
How to protect your online gaming accounts?
PCQuest

How to protect your online gaming accounts?

In today’s digital age, online gaming has exploded in popularity, attracting millions to virtual worlds. However, this surge also attracts cybercriminals targeting gaming accounts for financial gain and personal data. Protecting your online gaming accounts is essential to prevent unauthorized access, digital asset theft, and personal information breaches

time-read
5 mins  |
August 2024