M
MercyNews
Home
Back
Third-Party Cyber Threats Surge in Russia
Technology

Third-Party Cyber Threats Surge in Russia

A new report reveals that over 90% of Russian corporate networks are vulnerable to total takeover, with a significant portion of attacks originating from third-party contractors.

Kommersant11h ago
5 min read
📋

Quick Summary

  • 1Over 90% of corporate networks in Russia are vulnerable to complete compromise.
  • 2One in three successful cyberattacks now occurs through contractors of the victim organization.
  • 3The overall number of attacks is rising while hacker services become cheaper on the shadow market.
  • 4Businesses are forced to rethink security strategies, treating information security as a core factor of operational stability.

Contents

The Hidden BackdoorA Vulnerable EcosystemThe Economics of CybercrimeRedefining Operational StabilityThe Path ForwardKey Takeaways

The Hidden Backdoor#

Cybersecurity landscapes are shifting rapidly, and the perimeter of corporate defense is no longer just the front door. A comprehensive analysis of the Russian digital ecosystem reveals a startling vulnerability: the supply chain. Third-party contractors have emerged as the primary vector for cybercriminals, fundamentally altering the risk profile for businesses across the region.

The data paints a grim picture of the current state of digital defense. With the shadow market for hacker services expanding and costs dropping, the barrier to entry for cybercrime has never been lower. This democratization of digital malice is forcing a strategic pivot in how companies approach their operational resilience and long-term stability.

A Vulnerable Ecosystem#

The scale of the threat is systemic. Over 90% of corporate networks in the region are currently exposed to the risk of total takeover. This statistic suggests that the vast majority of organizations lack the necessary defenses to prevent a catastrophic breach of their entire digital infrastructure.

Compounding this issue is the specific nature of the attacks. It is no longer sufficient to harden only internal systems. The data indicates that every third successful attack is executed through a contractor or partner organization. These external entities often possess legitimate access to sensitive networks, creating a blind spot in traditional security monitoring.

The implications are profound. A breach via a contractor bypasses many conventional perimeter defenses, such as firewalls and intrusion detection systems, which are typically configured to monitor internal traffic. This creates a scenario where the attack surface is exponentially larger than previously estimated.

  • 90%+ of networks vulnerable to full compromise
  • 33% of attacks originate via third-party vendors
  • Rising volume of attacks overall
  • Decreasing cost of hacker services

The Economics of Cybercrime#

Two converging market forces are driving this surge: the rising volume of attacks and the plummeting cost of execution. The shadow market for hacking services has matured, offering sophisticated capabilities at a fraction of their previous cost. This economic shift has turned cybercrime into a scalable, low-risk business model.

As the price of entry drops, the motivation for attackers shifts from high-value, singular targets to a volume-based approach. This means that smaller businesses, previously considered "beneath the radar," are now viable targets. The financial barrier to launching a coordinated attack has been effectively removed, allowing bad actors to cast a wider net.

Consequently, businesses can no longer rely on obscurity as a defense. The commoditization of hacking tools means that automated attacks can scan and exploit vulnerabilities across thousands of networks simultaneously. This requires a fundamental re-evaluation of how security budgets are allocated, moving from reactive measures to proactive, intelligence-driven defense strategies.

Redefining Operational Stability#

The traditional view of cybersecurity as a siloed IT function is becoming obsolete. The current threat landscape demands that information security be recognized as a critical component of operational stability. A breach is no longer just a technical glitch; it is a direct threat to business continuity.

Organizations are now compelled to integrate security assessments into every aspect of their operations, particularly when engaging with external partners. The risk posed by a contractor is effectively a risk posed by the company itself. This necessitates rigorous vetting processes and continuous monitoring of third-party access privileges.

The shift in perspective is crucial. Instead of viewing security as a cost center, forward-thinking companies are treating it as an investment in resilience. This involves:

  • Implementing zero-trust architectures
  • Conducting regular third-party security audits
  • Limiting access privileges strictly to need-to-know basis
  • Investing in real-time threat detection systems

By embedding security into the core of their operational strategy, businesses can better withstand the inevitable attempts at infiltration.

The Path Forward#

Addressing the vulnerability of corporate networks requires a holistic approach that extends beyond the organization's immediate walls. The interconnected nature of modern business means that the security of one entity is inextricably linked to the security of its partners.

Future strategies must focus on collaborative defense. This involves sharing threat intelligence with industry peers and establishing security standards for the entire supply chain. A single weak link can compromise the entire ecosystem, making collective security a priority.

Ultimately, the goal is to raise the cost and complexity for attackers. By hardening the external attack surface and fostering a culture of security awareness across all levels of the organization and its partners, the tide can be turned against the rising wave of cyber threats. The era of relying solely on internal defenses is over; the future of cybersecurity is borderless.

Key Takeaways#

The data highlights a critical juncture for corporate security in the region. The tripled rate of attacks via contractors signals an urgent need for systemic change. Businesses must adapt to a reality where the perimeter is fluid and the threats are internalized through third-party relationships.

Ultimately, the path to security lies in comprehensive visibility. Understanding exactly who has access to the network and what they can do is the first step toward mitigating the risk of total compromise. As the shadow market continues to evolve, so too must the defenses of the corporate world.

Frequently Asked Questions

The primary vulnerability is the high susceptibility of corporate networks to total compromise, with over 90% currently exposed. A significant portion of these breaches occur through third-party contractors rather than direct attacks on the company's internal systems.

The shadow market for hacking services has become more accessible and affordable. The cost of hacker services has dropped significantly, while the overall number of attacks has risen, creating a more dangerous and widespread threat environment.

Businesses are being forced to integrate information security into their core operational strategies. This involves recognizing security as a key factor of stability, rigorously vetting third-party contractors, and adopting a more proactive, intelligence-driven approach to defense.

Contractors often possess legitimate access to sensitive corporate networks, which can bypass traditional perimeter defenses. This makes them an attractive target for attackers looking to infiltrate a company's systems through a trusted but less secure third party.

#Телекоммуникации

Continue scrolling for more

AI Transforms Mathematical Research and Proofs
Technology

AI Transforms Mathematical Research and Proofs

Artificial intelligence is shifting from a promise to a reality in mathematics. Machine learning models are now generating original theorems, forcing a reevaluation of research and teaching methods.

Just now
4 min
342
Read Article
We're siblings who built a 6-figure Turo business in under 2 years. We started with just our mom's car — here's how we scaled up.
Lifestyle

We're siblings who built a 6-figure Turo business in under 2 years. We started with just our mom's car — here's how we scaled up.

Mike and Darlene Person. Courtesy of JDM Whipz Siblings Michael Rumph and Darlene Person built JDM Whipz, a profitable Turo car rental fleet. JDM Whipz grew to 13 vehicles in Atlanta by reinvesting profits and focusing on customer service. Their experience highlights Turo business strategies, challenges, and the importance of planning. This as-told-to essay is based on conversations with Michael Rumph, 60, and Darlene Person, 61, siblings in metro Atlanta who run JDM Whipz, a 13-car Turo fleet. It has been edited for length and clarity. Darlene: For several years, my brother, Mike, and I talked about wanting to go into business together. We considered a few ideas but hadn't settled on one. In February 2022, we rented an Escalade from Turo for a family trip. Almost exactly a year later, we launched our own Turo business, JDM Whipz. By 2024, JDM Whipz was making six figures in profit. We were fascinated by how quickly and easily we'd rented a car from Turo Darlene: Mike dove into research, sending me videos and websites every week. We began meeting on Sundays to discuss launching a Turo business. By January 2023, we had registered the company, and in late February, we went live on Turo, securing our first booking on the same day. I'm a federal government employee, and I still work full-time. Most of my Turo work takes place in the evenings, when I prep cars after my day job. When we started, both of us were balancing full-time jobs. Mike: I'm an IT nerd with 37 years of experience in desktop support, server support, and project management. Now, I'm a full-time Turo project manager. Our first car was a 2016 Toyota Corolla Mike: The Corolla belonged to our mom, who died in June 2022. It's still on the platform; I just had the front end repainted and protective film added. From there, we purchased a 2017 Mazda, a 2017 Chevy Malibu, a 2017 Equinox, and a 2018 Equinox. By the end of our first year, we had 10 cars. We purchased eight with cash and used "creative financing" for the other two, purchasing them with 0% credit cards Today, we have 13 vehicles — we own 12 outright and have one payment on a 2019 Chrysler Pacifica. We've had five cars totaled in the past year, but because I hold a dealer's license and buy vehicles wholesale at auctions, we've been able to replace them and even come out ahead on insurance payouts. The price difference compared to traditional rental companies is huge Mike: Enterprise once quoted me $805 for an SUV from Friday to Sunday. Turo cost us $360 for four days and 600 miles when we rented that Escalade. Darlene: We listed mom's Corolla as a trial, but the first renter kept extending her trip week after week, and it ended up being 2.5 months total. The car was gone, and we had nothing to do, so we said, "Let's add another." From the start, we reinvested every dollar back into the business. That's how we grew to 10 cars in a year. We choose Turo's 60% protection plan: we keep 60%, Turo takes 40%, but our deductible is lower. Hosts can take up to 90% but risk a much higher deductible. Understanding that trade-off is important. Mike: Day-to-day, I'm checking cars in and out, cleaning, handling inspections, and keeping up with competition in the Atlanta market. I left my IT job last April after paying off all my debts. I was breathing and dreaming of Turo at work. Now it's my focus. Darlene: Atlanta is huge, so Mike covers the north side, and I handle the south. We've never had all 13 cars sitting at our homes at once, where we store them. Usually they're rented out, coming back for a day or two before heading out again. I've learned more about cars in these two and a half years than I ever imagined. Turo does national advertising, but we're also exploring our own marketing efforts Darlene: We're obsessed with customer service. Over the years, we've both complained about poor service elsewhere. When we started JDM Whipz, I told Mike, "I want people to feel valued." Our reviews consistently mention exceptional service, which is the most rewarding feedback we receive. Mike: I built JDMWhipz.com because Turo's search doesn't show business names. Our site lets visitors view our entire fleet in one place without having to search. When ready to book, they tap a link that takes them directly to Turo to complete the reservation process. The biggest challenge for new hosts is capital. Ideally, buy or own your first car outright. Read Turo's Terms of Service carefully to understand the responsibilities of both the host and the guest. Another challenge is time Darlene: Most people start Turo while working full-time. You need excellent planning and time management. We learned the hard way: clean a car as soon as it returns. Early on, we'd say, "I'll do it in the morning," and then get a 7 a.m. booking. At 5 a.m., with car washes closed, you're in the driveway scrubbing, photographing, and prepping the car. Now it's a habit: the car comes in, and it gets cleaned. Mike: Revenue now depends on the season and the vehicle. Our Corolla rents for $42 to $46 per day. Some cars earn $800 a month, while others earn $1,200 during peak season in Atlanta, which typically spans from March to September. We're still making six figures in profit a year. Our biggest advice: do your homework Darlene: Check Turo's website for rules, like no cars older than 12 years or with more than 130,000 miles when listed. Watch videos from Turo hosts on YouTube, but vet their advice. Don't be afraid to ask experienced hosts for guidance. Mike and I mentor people all the time; we love helping new hosts succeed. Our long-term goal is to become Atlanta's go-to personal car rental company. We're proud of what we've built — and even prouder to do it together as siblings. Read the original article on Business Insider

13m
3 min
0
Read Article
Bitcoin Policy Institute, Fedi, Cornell Study American Financial Pr...
Cryptocurrency

Bitcoin Policy Institute, Fedi, Cornell Study American Financial Pr...

A collaborative research effort between the Bitcoin Policy Institute, Fedi, and Cornell University is set to explore American perspectives on financial privacy. The study arrives at a critical juncture as regulatory scrutiny intensifies.

32m
5 min
7
Read Article
NonUSA App Tops Danish Store Amid Greenland Tensions
Politics

NonUSA App Tops Danish Store Amid Greenland Tensions

A boycott application has reached the number one position in Denmark's App Store, a development linked to recent political statements regarding Greenland's status.

58m
5 min
12
Read Article
Nature's Funding Gap: The Business of Saving Nature
Environment

Nature's Funding Gap: The Business of Saving Nature

Global financing is heavily skewed to industries that harm rather than preserve nature, according to a new report that calls for an urgent scale-up of nature-positive spending.

1h
5 min
13
Read Article
Thailand to Launch Crypto ETFs and Futures Trading
Cryptocurrency

Thailand to Launch Crypto ETFs and Futures Trading

Thailand's Securities and Exchange Commission is preparing to introduce cryptocurrency exchange-traded funds and futures trading this year, a move designed to enhance investor safety and market maturity.

1h
5 min
16
Read Article
Adobe Unveils AI-Powered PDF Editing and Voice Narration
Technology

Adobe Unveils AI-Powered PDF Editing and Voice Narration

Adobe has introduced new AI-driven features for Acrobat Studio, including advanced PDF editing tools, voice narration, and automated presentation creation. These capabilities are now available to paid subscribers.

1h
5 min
17
Read Article
APL: The Language That Changed Programming Forever
Technology

APL: The Language That Changed Programming Forever

From its 1964 origins to its modern J Software incarnation, APL remains a powerful tool for mathematical and array-based programming. Discover why this unique language continues to captivate developers decades after its creation.

1h
7 min
12
Read Article
India's Strategic Crossroads: EU Deal Looms as U.S. Pact Remains Cr...
Politics

India's Strategic Crossroads: EU Deal Looms as U.S. Pact Remains Cr...

New Delhi navigates a complex geopolitical landscape, pursuing a monumental trade deal with the European Union while recognizing the indispensable role of a partnership with the United States for its economic trajectory.

1h
5 min
16
Read Article
Strive Plans $150M Raise for Debt and Bitcoin
Economics

Strive Plans $150M Raise for Debt and Bitcoin

Strive is planning a $150 million capital raise to pay down debt and purchase additional Bitcoin. The company is also exploring private debt-for-equity swaps with certain note holders.

1h
5 min
17
Read Article
🎉

You're all caught up!

Check back later for more stories

Back to Home