cyber decoder - JLT Specialty

1 downloads 240 Views 2MB Size Report
Dec 6, 2016 - In any case, the Tesco Bank incident should be a reminder that cyber risk is very real, and that businesse
CYBER DECODER FINANCIAL LINES GROUP NEWSLETTER ISSUE 18

CYBER COVER

RANDOM ATTACKS

US ELECTIONS

ALSO IN THIS ISSUE

New guidance from the Bank of England’s PRA means insurers can no longer ignore cyber risks.

Businesses don’t need to hold information that foreign governments want to be cyber attacked.

The US election is revealing a new area of potential systemic risk from cyber.

Cyber threat intelligence6 The cyber risk paradigm for 20177 Big data

Page 3

Page 4

7

Awards & Events 8

Page 5

9

Top Tweets 10

Tesco Bank mass online fraud The recent Tesco Bank mass online fraud incident has put the focus on theft and fraud. For businesses, this should be a reminder to be clear what is – and what isn’t – covered by their corporate insurance. The recent Tesco Bank cyber theft

has been some speculation that it could

criminals to work out the card number,

was “serious” and “unprecedented”,

have been linked to the rising prevalence

expiry date and security code of any

according to the Financial Conduct

of the Retefe malware targeting banking

Visa credit or debit card in as little as six

Authority (FCA) chairman Andrew Bailey,

customers in Sweden, Switzerland, Japan,

seconds using software that automatically

quizzed about the incident by the

and the UK. This particular type of malware

generates different variations of this data.

Treasury Select Committee. A month

has affected numerous banks around the

on, the “UK’s worst cyber theft” looks

world since February.

unlikely to remain unique.

Exploiting weaknesses in websites’ pages for entering card details, is “frighteningly

Academics at Newcastle University,

easy”, the academics wrote. The

Full details of the incident, which saw

meanwhile, have pointed to a wider

Newcastle team itself found 342 out of

£2.5 million stolen from 9,000 customer

weakness in the Visa card payment system

400 websites it looked at, were vulnerable

accounts, have yet to become clear. There

as the likely culprit. This, they say, enables Continued on page 2 

2

FINANCIAL LINES GROUP NEWSLETTER | Cyber Decoder | December 2016

to such a “distributed guessing attack.” Tesco Bank, most likely under the advice of legal counsel, has neither confirmed nor denied that these issues or any other type of cyber attack caused the theft.

CYBER CRIME: TWO THINGS, NOT ONE In any case, the Tesco Bank incident should be a reminder that cyber risk is very real, and that businesses have to double check the terms of their insurance. Always remember that just because someone tricked you using a computer, doesn’t mean a cyber policy is the only source of reimbursement. To retain customer confidence, Tesco quickly reimbursed its customers for the lost funds. This piece of the loss would be covered under a crime or bankers blanket bond insurance policy, not under a typical cyber policy. Cyber insurance policies normally contain a theft of funds

exclusion, and as long as appropriate

the costs of compensating customers

cover exists under other policies, there’s

who have lost their funds). A cyber

nothing wrong with that. As technology

policy, meanwhile, will pick up the other

and digital communication underpin all

(potentially substantial) costs, such as

aspects of business, it’s not sustainable

those for incident response, investigations

to assume that cyber insurance can

and customer notifications of data

absorb every possible consequence.

breaches.

In the US, we’ve seen different

To ensure they’re adequately covered

interpretations from the courts on

from not only a Tesco-type attack but

coverage. The issue at question, though,

any number of other online thefts and

is often whether or not a crime policy

frauds, businesses, particularly financial

will cover an incident; traditional cyber

institutions, need both.

policies almost never do. Cyber policies are focussed on the costs associated with data or IT security breaches, not unauthorised transfers of funds.

In such cases there may be some overlap, and it is worth working with a broker at the outset to help avoid disputes and passing the buck when it comes to a claim. But

Good cover is available. There’s just no

duplications in cover are preferable to

single, silver bullet. A modern, properly

gaps. For many who find themselves

drafted crime policy will usually cover the

victims of fraudsters and thieves in future,

direct losses from theft and fraud, whether

being over-insured will be a problem they

online or offline. This will reimburse the

will wish they had. 

money stolen (and a combined crime and professional indemnity (PI) policy will cover



www.jltspecialty.com

| Cyber Decoder

3

Clarity coming to cyber cover New guidance from the Bank of England’s Prudential Regulation Authority (PRA) means insurers can no longer just ignore cyber risks. In November, the PRA wrote to insurers

traditional insurance policies by virtue of

attack could cause losses to hundreds

following meetings with stakeholders

not being excluded.

of thousands of companies. Assessing

in the last quarter of 2015 and first half of 2016. Its letter, confirming the rapid growth of cyber insurance, also noted it had brought risks to the industry.

Worried about competition, many insurers have failed to introduce clear exclusions in non-cyber insurance policies. Instead some have relied on

these aggregate risks across their portfolio of business is a challenge for insurers.

“The prudential risks emanating from this

trying to later deny coverage only when

INTO THE LIGHT

fast-evolving field, if not managed well,

there is a claim. Sometimes they’ve been

It’s a challenge the PRA wants

are potentially significant to the viability of

unsuccessful and courts have ordered

insurers to address, however. It

the firms involved and the reputation of

them to pay out. In other cases, insureds

expects businesses to have clear

the UK insurance industry as a centre of

have found they’re not covered. Even

strategies for managing cyber risks,

excellence and innovation,” it stated.

if insurers do pay, exclusions can be

and proposes insurers explicitly state,

introduced at the next renewal.

quantify and consider the potential

Many firms, “do not currently have

for losses from their cyber cover.

clear strategies and risk appetites for

In many such cases where cyber is

managing cyber risk.”

included by default, no underwriting of

In time this will mean the industry goes

the risks has occurred, nor modelling of

one of two ways: either traditional

the potential losses. As a result, insurers

insurance policies will explicitly exclude

may not fully understand the scale of the

cyber risks, leaving insureds to use a

potential loss.

cyber policy to fill the gap; or these risks

The PRA went on to set out proposals (out for consultation until February) for its requirements of firms to illustrate they’re managing such cyber risks intelligently. If they go ahead, the proposals will,

The PRA also worries this may be

ultimately, be good news for buyers.

the case even where insurers provide affirmative (explicit) cover for cyber risks.

A SILENT KILLER The PRA has concerns around two areas where it thinks cumulative risks from cyber exposure could cause insurers problems. The first is “silent” cover, where cyber risks are covered in

will be included, but insureds will have to pay higher premiums and provide cyberrelated underwriting information.

Insured’s costs and liability where a

Either way, insurers will no longer be able

vendor is the source of a security breach

to stay silent on cyber; and, either way,

are a critical element of cyber cover, for

businesses will have greater certainty that

example. Given the reliance of much

any cyber cover they are relying on will

IT outsourcing on relatively few large

actually be there when they need it. 

providers, such as big cloud-computing service providers, a single successful

4

FINANCIAL LINES GROUP NEWSLETTER | Cyber Decoder | December 2016

A sign of the times Sometimes it is a teenager in a bedroom: Sentencing of the 17-year-old who admitted responsibility for last year’s data breach affecting 156,000 TalkTalk customers took place on December 13. The boy, who was 16 at the time of the attack, told magistrates in November he had just been “showing off.” The case illustrates a number of points.

sources contribute to the frequency

There is actually little evidence telecoms

First, it can fairly be seen to have

and scale of risk businesses face.

providers are particularly under threat.

highlighted the weakness of TalkTalk’s controls at the time. That’s also reflected in its record £400,000 fine handed down by the Information Commissioner’s Office (ICO) in November.

Such attacks also ensure there will always be a degree of randomness in the businesses that are attacked; businesses don’t actually need to hold information that foreign governments

The company’s security failings allowed

want – or even that is valuable

the attacker to access customer data

to criminals – to be targeted.

“with ease,” the ICO found.

What is unique about them, however, is that they already have a statutory duty to notify customers of any data breaches – the same sort of duty that will apply generally under the General Data Protection Regulation (GDPR). The frequency of such stories from the telecoms sector therefore perhaps

Finally, the TalkTalk case is just one of

gives us an indication of what we

The attack also illustrates the challenge

a number of recent cases concerning

can expect when the new regime

facing businesses, however. For all

telecoms providers. November also

comes into effect in May 2018. 

the hype about cyber terrorism and

saw mobile provider Three reveal that

foreign governments with unlimited

security may have been compromised

resources (blamed for, among others,

for as many as two thirds of its nine

the recent attack on Yahoo), it remains

million customers, for example. And

surprisingly simple for anyone from

TalkTalk, together with the Post Office’s

petty criminals to bored teenagers to

broadband business, was again in the

allowed the attacker to access

get hold of tools to mount an attack.

news in December after customers’

customer data “with ease”

Foreign powers may present a more

routers were targeted.

sophisticated risk, but these other

The company’s security failings



www.jltspecialty.com

| Cyber Decoder

Cyber risks where it counts The US election is revealing a whole new area of potential systemic risk from cyber. In the run-up to the US election

It’s unlikely to change the outcome.

enemy looking to sway an election. It’s

there were concerns cyber attacks

Concerns before the election may have

much more likely that a variety of what

would attempt to derail electronic

been overstated; and claims cyber

Interpol calls cyber-enabled crimes

voting. This was not without cause,

attacks swayed the result have been

would be employed, and recent US

given the role hackers had already

described as “far fetched” by election

intelligence reports have shed light on

played in the campaign, revealing

officials. However, the controversy does

this very possibility.

confidential emails from Hilary Clinton’s

reflect real concern over voting systems.

campaign team, and the attacks on

What is being called for in the US is not

state election database systems.

so much a recount as an audit.

IT experts fretted that attackers could

The potential for hacking electronic

for disruption they bring that is

sabotage the election day by targeting

voting machine is plainly not science

well outside their control. 

voting machines, many of them reliant on

fiction, and cyber security is now a key

out-dated software. Even after the day

topic in debates over electronic voting,

seemed to pass without incident, some

not just in the US, but everywhere from

In the run-up to the US election

continue to question whether hacking

Australia to Argentina.

there were concerns cyber

Of course, it’s becoming clearer that

attacks would attempt to derail

influenced the results, with computer scientists at the University of Michigan supporting calls for a recount.

simply hacking voting machines is unlikely to be the tool of choice for an

For businesses, it is perhaps just another example of the pervasiveness of cyber risks – and the potential

electronic voting.

5

6

FINANCIAL LINES GROUP NEWSLETTER | Cyber Decoder | December 2016

Cyber threat intelligence Brought to you in partnership with JLT Specialty’s Cyber Risk Consortium Partner CSC In November German telecoms

However, as the number of devices

business giant Deutsche Telekom,

that are compromised due to lack of

which owns T-Mobile, revealed in a blog

updating or patching grows, there is

that it had been attacked, with about

the potential these devices may be

900,000 of its users affected. This saw

used in denial of service (DoS) attacks

those users’ suffer from an exploit of

directed at larger businesses.

the “NewNTPServer” feature in their broadband modems.

More generally, this is another attack that’s been blamed on the Mirai worm

For some customers this meant

responsible for Dyn DoS in October,

temporary problems or fluctuations in

which took down sites including Twitter,

quality; for others, no service at all. An

Netflix and Spotify. Criminals are now

update to the initial post, meanwhile,

marketing hundreds of thousands of

confirmed that this was the result of an

compromised hosts for use in attacks for

outside attack: It was trying to infect

low prices and increasing durations.

routers with malware, but failed and in a small proportion of cases caused crashes or restrictions to customer accounts.

No one is immune from attack, and monitoring and planning remain the best defence as other

A reboot was enough to get rid of it.

strategies are developed.

No one is immune from attack,

RECENT VULNERABILITIES

and monitoring and planning

December 6: Security researchers

remain the best defence as other

announced a critical Linux vulnerability

strategies are developed

that could enable an attacker to gain unauthorized root access, giving them full control of the victim’s machine.

NOTHING TO WORRY ABOUT? The vulnerability seems to be closely related to ports 7547 and 5555, which have seen a spike in traffic, and are usually used by ISPs to remotely manage modems. The exploit itself is unlikely to affect that many business networks. Businesses with DSL modems should

This vulnerability is present in the

TOR features enabling anonymous

kernel of nearly every current Linux

browsing. The same vulnerability exists

distribution, meaning the vulnerability

in the widely used Firefox browser,

is very widespread. So far it is not

however, and has the potential to be

easily exploited, but awareness of the

targeted on Windows, Mac and Linux.

vulnerability is likely to result in new

The vulnerability is likely to be quickly

threats. Those with affected systems

incorporated into exploit kits and

should patch them as soon as possible

commodity hacking tools. To protect

with the patch released the same day.

themselves, users should both enable

check their provider for any updates and

November 29: A new critical vulnerability

install patches where required. That’s

in Firefox and the Firefox-based

because the vulnerability is actually a

“Anonymity Online” TOR browser is being

variant of one – “Misfortune Cookie”,

actively exploited, according to reports.

CVE 2014-9222 – discovered a few

The exploitation of the vulnerability was

years ago.

observed attempting to circumvent

the “NoScript” JavaScript blocker as a Firefox add-on and patch all vulnerable products as soon as possible. 



www.jltspecialty.com | Cyber Decoder

7

The cyber risk paradigm for 2017 Cyber security in today’s world is a misnomer. Our government agencies, businesses, and personal lives are irreversibly connected to the worldwide web that provides enormous opportunity and convenience. However, success in this “connected”

security firms, such as Dynetics, have

Boards are advised to actively promote

world requires organizations sacrifice

little trouble in breaching even the most

cyber risk management and review

absolute security - and therein lies the

sophisticated company networks; and

performance periodically. Participation

problem. Because being connected

what is found after easily bypassing

and oversight at board level will help

requires some amount of insecurity,

traditional perimeter defenses should be

ensure communication voids between

the same worldwide web that creates

alarming to businesses executives.

IT and non IT functions are bridged and

opportunity and convenience, also gives rise to sophisticated, dynamic cyber threats motivated by financial gain, activism and state-sponsored espionage.

Most businesses don’t incorporate detection into their cyber security. Without detection, cyber criminals

cyber risk management establishes itself as a core tenant of sound corporate governance.

move freely for as long as necessary to

This article was contributed by JLT Cyber

In traditional cyber security approaches

compromise all key information assets.

Risk Consortium partner Dynetics. For

focused on perimeter protection are

Even with excellent cybersecurity

more information contact

no longer effective. Firewalls that block

controls, the lack of detection ultimately

[email protected]. 

unauthorized connections, must also

leads to significant impacts because a

allow email. Anti-virus tools that detect

motivated, experienced cyber criminal,

known malware, overlook the unknown;

given extended time in a network, has

and intrusion detection systems that

a better chance of finding a vulnerability

examine network traffic are blind to

than a cybersecurity professional has of

encrypted communications. And when

eliminating 100% of vulnerabilities.

security measures are effective, cyber

DYNETICS Dynetics provides responsive,

Therefore, to be successful in 2017,

cost-effective engineering, scientific,

resilience must be the goal, with

and IT solutions to the national

cyber security giving way to cyber risk

security, cybersecurity, satellite,

management. Businesses must assume

launch, automotive, and critical

breaches and ensure their secondary

infrastructure sectors. Their portfolio

protection slows cyber criminals’ access

features highly specialized technical

to key information assets. Cyber security

services and a range of software

professionals can flip the paradigm so that

and hardware products, including

one mistake by the cyber criminal triggers

components, subsystems, and

Digital breaches are inevitable, simply

their detection and allows eradication

complex end-to-end systems.

because well-crafted phishing emails

before key information is compromised.

criminals find new attack vectors. It’s a continuous match of wits between cybersecurity professionals and cyber criminals. However, the very nature of a “connected” society demands we leave openings in our security and, consequently, makes cyber security in today’s world a misnomer.

are still highly effective. Specialist cyber

8

FINANCIAL LINES GROUP NEWSLETTER | Cyber Decoder | December 2016

Top cyber broker in the London market Award The Insurance Insider Cyber Rankings survey 2016 named Jack Lyons from our Cyber team as top Cyber broker in the London market. Sarah Stephens, JLT’s Head of Cyber,

maintaining excellent market relationships

comments: “Jack’s tireless dedication

through personal integrity, preparation,

to finding the best possible customised

and excellent technical skills. On top of

coverage for our clients in a dynamic area

that he’s passionate about mentoring our

like cyber is a key reason for our team’s

junior team members, ensuring that JLT’s

success. He’s constantly innovating

cyber practice will grow even stronger in

and pushing the market for the benefit

the future.”

of our clients, but always conscious of

Recent Event BUSINESS RESILIENCE SEMINAR Hosted by Lloyds Bank and Do

more resilient in the face of growing

Different Management Consultancy,

cyber threats. Jack explored the range

Norwich, on the 6th December 2016.

of cyber risks that are currently most

Jack Lyons, Partner in JLT Specialty’s cyber team, was part of a panel discussing how businesses can become

prevalent and afflicting companies nationwide. He was joined by David Higgins of Do Different and Paul Maskall of Norfolk and Suffolk Constabularies.

07

Upcoming Events

MAR

2017

1415

MAR

2017

Co-chairing: Sarah Stephens

Speaking: Florence Levy

Advisen Cyber Risk Insights Conference

Advisen Cyber Risk Insights Conference

London, UK

San Fransico, USA

JLT’s global cyber team are frequent speakers at key industry events. If you would like to hear more of our insights or plan a meeting with us at the following upcoming events please email [email protected]

07

MAR

2017

1415

MAR

2017

2122

MAR

2017

30

MAR

2017

Co-chairing: Sarah Stephens

Speaking: Florence Levy

Speaking: Florence Levy

Speaking: Steve Bridges

Advisen Cyber Risk Insights Conference

Advisen Cyber Risk Insights Conference

ExecuSummit: 6th Annual Cyber Liabilities Insurance Event

ACI Cyber and Data Risk Insurance Conference

London, UK

San Fransico, USA

Uncasville, USA

Chicago, USA

Read more

2122

MAR

2017

Read more

30

MAR

2017

Speaking: Florence Levy

Speaking: Steve Bridges

ExecuSummit: 6th Annual Cyber Liabilities Insurance Event

ACI Cyber and Data Risk Insurance Conference

Uncasville, USA

Chicago, USA

Read more



www.jltspecialty.com | Cyber Decoder

BUZZWORD OF THE MONTH BIG DATA

The analysis of big data has potentially

Big data often means transferring data

infinite applications. For businesses it

to an outsourced provider, for example,

What is it?

may be a source of increased insight

or collecting data from thousands of

into customers’ behaviours and

devices in the field. Connectivity brings

preferences, a route to streamlining

vulnerabilities, and, when these are

processes and operations, or a

successfully exploited, big data can

method to identify theft and fraud.

mean big data breaches, with a mass of

Big data refers to data sets larger than those traditional data processing applications can deal with. The availability of data is fuelled by the digitisation of almost every aspect of modern life, from systems,

personal information potentially exposed. Why should you care?

However, finally, in the cyber and

When it comes to cyber risks, big data

wider insurance industry, big data

is a double-edged sword. On the one

may unlock a big opportunity. For

It is closely related to a number of

hand, big data can help anticipate

insurers to better understand and

other much-discussed technologies.

and respond to cyber threats more

price cyber risk, they must access

The Internet of Things, for example, is

effectively. It may help detect and

new and better data sources from

making a significant contribution to the

anticipate attacks faster, for example,

inside and outside their organisations,

amount of data available. The cloud,

or improve the way staff are alerted to

and we expect a whole new class

meanwhile, gives businesses and

risks, to improve responses.

of service providers will grow up

sensors, phones, and tablets.

others access to storage capabilities and computational power without which they would struggle to make use of the data available. These allow businesses to capture, store and make sense of big data.

On the other hand, as the European

promising to help with just that task.

Network and Information Security

As big data only gets bigger, so will

Agency has warned, big data also

the challenges and opportunities

opens businesses up to big risks.

it brings for businesses and their insurers alike. 

9

JLT Specialty Limited provides insurance broking, risk management and claims JLT Specialty Limited provides insurance consulting services to large and international companies. Our success comes from broking, risk management and claims focusing on sectors where we know we can consulting services to large and international make the greatest difference – using companies. Our success comes frominsight, intelligence and imagination to provide focusing on sectors where we know weexpert can advice and robust difference – often unique – solutions. make the greatest – using insight, We build partner teams to work side-by-side intelligence and imagination to provide expert advice – often unique – solutions. with you,and ourrobust network and the market Wedeliver build partner teams to work side-byto responses which are carefully side with you, our network and the market considered from all angles. to deliver responses which are carefully considered from all angles. Our Cyber, Content and New Technology

Top Tweets

Risks team Technology, delivers bespoke risk Errors Our Cyber, and Media management and insurance solutions to & Omissions team delivers bespoke risk management and solutions to meet meet the needs ofinsurance clients from a variety of the needs of clients a variety of industries. industries. The teamfrom combines experience The talent team combines experience talent with and with a track record ofand delivering a track record of delivering successful results successful results and tangible value for and tangible value for our clients. our clients.

CONTACTS Sarah Stephens Head of Cyber, Content and New Technology Risks, and Media JLT Specialty E&O JLT Specialty +44 (0) 20 7558 3548 [email protected]

Home Depot Data Breach Derivative Lawsuit Dismissed

Hackers are holding San Francisco’s light-rail system for ransom

Jack Lyons Lauren Cisco Partner, JLT Specialty +44 (0) 20 7528 7558 4114 3519 [email protected] [email protected] Jack Lyons Partner, JLT Specialty +44 (0) 20 7528 4114 [email protected]

European Commission gets DDoSed

JLT comments on the Three Mobile cyber incident

This publication is for the benefit of clients and prospective clients of JLT Specialty Limited. It is not legal advice and is intended only to highlight general issues relating to its subject matter but does not necessarily deal with every aspect of the topic. If you intend to take any action or make any decision on the basis of the content of this newsletter, you should first seek specific professional advice. JLT Specialty Limited The St Botolph Building 138 Houndsditch London EC3A 7AW www.jltspecialty.com

Lloyd’s Broker. Authorised and regulated by the Financial Conduct Authority. A member of the Jardine Lloyd Thompson Group. Registered Office: The St Botolph Building, 138 Houndsditch, London EC3A 7AW. Registered in England No. 01536540. VAT No. 244 2321 96. © December July 2016 272327 2016 273500

The Cyber President? What To Expect From the Trump Administration On Cybersecurity And Privacy

The simplest way to reduce ‘silent’ cyber risk in response to PRA concern is clear exclusions...