| |
Fraud and Extortion
- Eight banking web sites in the United States, Canada, Great Britain, and
Thailand were attacked resulting in 23,000 stolen credit card numbers. The
hackers proceeded to publish 6,500 of the cards online causing third-party
damages in excess of $3,000,000.
- A hacker stole approximately 300,000 customer credit card numbers from an
online retailer. The hacker then attempted to use the stolen information to
extort $100,000 from the company. Upon the firm"s refusal to cooperate,
the hacker posted 23,000 card numbers online. As a result of the charge
denials, credit card cancellations and re-issuance, the online retailer
suffered approximately $2,000,000 in lost income and third-party damages.
- Two hackers cracked the computer systems of a major market research firm
and subsequently obtained confidential corporate records. The stolen files
included employee photographs, network passwords and personal credit card
numbers of numerous senior managers. The hackers threatened to reveal the
security breach to the company"s clients unless the Board of Directors
paid them a "consulting fee" of $200,000. Upon retaining expert
cybercrime investigators, the hackers were apprehended and prosecuted. The
research firm spent approximately $1,000,000 in investigative and public
relations fees.
Denial-of-Service Attacks, Sabotage and Business Interruptions
- A hacker overwhelmed several large web sites through multiple distributed
denial of service (DDOS) attacks. The culprit hijacked various computers
throughout the world to bombard target servers with seemingly legitimate
requests for data. It is estimated that the DDOS attacks, which interrupted
the sites" ability to efficiently conduct their business, caused over
$1.2 billion in lost business income.
- A disgruntled employee of a major consulting firm downloaded malicious
code onto the networks of the firm, its clients and vendors. The code
launched confidential information into the public domain and destroyed some
critical corporate applications, resulting in more than $10,000,000 in
third-party claims.
Viruses
- In 1999, the Melissa email virus overwhelmed systems of thousands of
companies around the world. The operations of at least 60 US-based Fortune
500 companies were brought to a halt due to the inability to handle the
massive amounts of incoming and outgoing messages generated by the virus.
The virus collectively caused millions of dollars in lost business income.
- The Love Bug virus (also known as the "I Love You" virus) spread
rapidly through corporate email systems, infecting networks of hundreds of
companies around the world. This attack was followed a few days later by as
many as 11 copycat versions of the virus. It is estimated that the series of
attacks collectively cost billions of dollars in lost business income and
extra programming time.
Personal Injury/Privacy
- One of nation"s largest health insurers inadvertently sent email
messages to 19 members containing confidential medical and personal
information of 858 other members. Although the company immediately took
steps to correct the problem, the company is now exposed to lawsuits
alleging invasion of privacy.
- A utility admitted to a massive security breach that left debit card
details of thousands of customers open to public scrutiny. A customer
discovered the security hole when he went to pay his bill online - he
discovered three files on the web server, containing the names, addresses
and card details of more than 5,000 home and business users, including his
own.
- An e-tailer brought suit against a web designer for damages the e-tailer
sustained as the result of the unauthorized access of its private data files
by a "hacker". The suit alleges that the web designer negligently
designed the e-tailer"s web site by not providing adequate safeguards
to prevent such type of intrusion.
Privacy Violations--Unauthorized Access to Customer
Information
- A bank employee obtained unauthorized access to the computer system in
order to search for potential clients for a friend in the real estate
business. The employee provided confidential information regarding consumers
to the friend. The scheme was discovered after the confidential information
was leaked to another party and subsequently used as a part of an identity
theft scheme.
- netAdvantage can protect you from suits that may arise from unintentional
breeches of your privacy policy arising from a security breech. netAdvantage
can also protect you from suits filed against you from consumers seeking
damages due to identity thefts, should the consumers" information be
released due to a failure of security of your computer system1
Intellectual Property Infringement
- An online service allowed a famous author to advertise a book in one of
its forums. The online service was sued for copyright infringement by an
artist who claimed that the author used certain artwork on the cover of his
book without getting the artist"s permission.
- An online news service created a web site inclusive of hyperlinks to
alternate sites that were maintained by traditional print and broadcast
media companies. When users clicked the links, they were linked to a framed
copy of the site, rather than the site, itself. The traditional media firms
sued the host site for copyright and trademark infringement on the basis
that the firm was a "parasitic…site that republished the news and
editorial content in order to attract both advertisers and users."
- An online insurance brokerage created a hyperlink that seemingly
transferred its clients to additional pages on the site. It was later
discovered that the brokerage "deep-linked" its users to the web
pages of various insurance companies creating a seamless navigational
experience. The insurance companies sued the online brokerage for copyright
and trademark infringement.
- In an effort to drive additional users to its site, an online retailer
registered meta tags that identified its firm with the names of its
competitors. Upon discovery of the incident, competitors sued the retailer
for copyright infringement.
Negligent Security
- On June 21, 2000, hackers penetrated a US sporting apparel"s computer
network and redirected its online traffic to a rogue anti-apparel site via
servers domiciled at an overseas web hosting facility. The traffic swamped
the overseas servers and subsequently impaired service to its real
customers. The web host is suing the apparel firm for negligence in
adequately securing its Internet domain.
Online Trespass
- An online direct marketing company emailed solicitations on behalf of its
clients to all users of a commercial Internet service provider (ISP). The
ISP sued the marketing company for online trespassing. The court found that
the marketing company was liable for trespass and damage to the ISP"s
reputation.
Product Scenarios
- A hacker overwhelmed several large Web sites through multiple distributed
denial of service (DDOS) attacks. The culprit hijacked various computers
throughout the world to bombard targeted servers with seemingly legitimate
requests for data. It is estimated that the DDOS attacks, which interrupted
the sites" ability to efficiently conduct their business, caused over
$1.2 billion in third-party liability claims and lost business income.
- A disgruntled employee of a major consulting firm downloaded malicious
code onto the networks of the firm, its clients and vendors. The code
launched confidential information into the public domain and destroyed some
critical corporate applications, resulting in more than $10,000,000 in third
party claims.
- An online news service created its web site by framing the content of
other media companies within their site. By doing so, the service created
the illusion that the content was all their own.
The other media firms sued the site for copyright and trademark infringement
on the basis that the firm was a "parasitic…site that republished the
news and editorial content in order to attract both advertisers and
users."
- An e-tailer brought suit against a Web designer for damages the e-tailer
sustained as the result of the unauthorized access of its private data files
by a "hacker". The suit alleges that the Web designer negligently
designed the e-tailer"s Web site by not providing adequate safeguards
to prevent such type of intrusion.
- A hacker stole approximately 300,000 customer credit card numbers from an
online retailer. The hacker then attempted to use the stolen information to
extort $100,000 from the company. Upon the firm"s refusal to cooperate,
the hacker posted 23,000 card numbers online. As a result of credit card
cancellations and re-issuance, the online retailer suffered approximately
$2,000,000 in lost income and third-party damages.
Unauthorized Access
- An employee of a major financial institution obtains account information
and credit card account numbers for 68 accounts from the bank"s
computer systems without authorization or in excess of her authorization.
The information is used in a scheme to defraud the bank, and results in the
fraudulent acquisition of good valued at approximately $100,000.
- netAdvantage can protect financial institutions from suits filed by
consumers seeking damages due to identity thefts, should the consumers"
information be released due to a failure of security of the
institution"s computer system2. NetAdvantage can also
protect a financial institution due to suits that arise from merchants
seeking legal damages due to fraud losses arising from a breech of the
institution"s security system.
Hacking/Breach of Network Security and Extortion
- Russian hackers gain unauthorized access to the computer systems of
various financial institutions and others. Using this unauthorized access,
the hackers obtain account information for over 56,000 credit cards as well
as personal financial information of consumers. The hackers used the
information to defraud Internet payment services as well as to
control/manipulate Internet auctions. In addition, the hackers attempted to
extort money from the victims with threats of exposing information publicly,
or damaging the victims computer systems.
- netAdvantage can protect a financial institution from the following
losses, if resulting from a failure of security of the insured institution's
computer system3:
1. for legal liability to merchants and service providers
2. for the cost to restore/recreate data, and the loss of Internet revenue
3. direct loss or costs resulting from cyber-extortion.
Gramm Leach Bliley Act - GLBA
Compliance PDF
Health Insurance Portability and Accountability Act - HIPAA
Insurance
|