Lessons From the Goldcorp Extortion

Unfortunately, another breach has made the headlines and it’s déjà vu all over again. The narrative surrounding the Goldcorp breach is similar to other doxing attacks: Attackers appear to have...
1 min read
Last updated October 21, 2021

Unfortunately, another breach has made the headlines and it’s déjà vu all over again. The narrative surrounding the Goldcorp breach is similar to other doxing attacks:

  • Attackers appear to have had undetected access to confidential information for months,
  • Sensitive files and emails were stolen,
  • And multiple GBs of data were exfiltrated without sounding an alarm.

The hackers in the Goldcorp incident claim they have emails showing corporate racism and sexism. But they were not entirely motivated by ideology. Instead, they also asked for money to not release the 1.8 GB of data they say is in their possession.

The hack also resulted in personal information about employees (ids, passwords, salaries) being disclosed.

The CEO of Goldcorp, a Vancouver-based mining company, points out that because they’re a public company, sensitive data is automatically in the public domain.

In any case, the breach underscores yet again the need to monitor access to confidential documents and mailboxes as if they were bank accounts.

And this incident is on top of the hacking of U.S. Steel for its IP involved in lightweight steel technology.

Our opinion on all this?

Perimeter defenses will not stop hackers from getting in. Period.

You’ll need to monitor file and other system activities. And the most effective way to interpret this activity is to compare it against a baseline, and use that to decide who’s a hacker (or insider), and who’s doing legitimate work.

In other words, you need User Behavior Analytics or UBA.

Got UBA? Learn more about how tracking behaviors can help mitigate your breach risks.

 

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

a-user-always-finds-a-way:-the-federal-security-dilemma
A User Always Finds a Way: The Federal Security Dilemma
Our experts share how the road to data loss is usually paved with good intentions, and strategies for federal agencies to combat unintended mistakes.
is-dspm-in-the-cloud-any-different?
Is DSPM in the Cloud any different?
Explore how DSPM evolves in the cloud—real-time visibility, automation, and compliance across dynamic, multicloud environments.
when-ransomware-wreaks-havoc-on-hospitals
When Ransomware Wreaks Havoc on Hospitals
Dayton Children's Hospital CIO J.D. Whitlock shares insights on cybersecurity in healthcare, including managing ransomware threats.
why-data-security-starts-with-what-you-can’t-see
Why Data Security Starts With What You Can’t See
Discover the most overlooked gaps in data security strategies and how to close them with automation, visibility, and unified protection across platforms.