The complexities of security attacks have been increasing as the defenders of organization assets get more skilled. The change to multi-pronged and multi-vector attacks has stymied many businesses, in that the connection between the pieces of the assault can be tenuous, or split by time and source. The ability to "connect the dots" of this type of picture is not widespread and calls for more collaboration than most organizations have with their peers, competitors and partners.
One form of this attack type is increasing rapidly and forms a flanking maneuver around many of the existing security protocols. That form has as its base the acquisition of wealth via stock manipulation. The components are four-fold:
1 - successful (or semi-successful) incursion
2 - social media campaign to advertise the successful incursion, sowing fear, uncertainty and doubt
3 - acquisition via short (or naked short) purchases of stock as its value drops
4 - sale of recovered stock
This category of attack crosses boundaries that are not normally crossed, among departments that have limited communications. The effectiveness of the attacks is very high and the response options are not many. Constructing mechanism to proactively defend against this vector and building a response to occurrence are starting to define another area and shape of organizational security today.