The Business-Technology Weave

Feb 19 2013   10:33AM GMT

Cyberwar Between Business Competitors – This blog’s prediction come true?

David Scott David Scott Profile: David Scott

It’s just been reported that Burger King’s Twitter feed was hacked.  The Burger King logo was replaced with McDonald’s golden arches logo.

Further, a tweet indicated that “the whopper flopped” and that BK had thus been sold to McDonald’s.  Several other tweets contained obscenities.

It’s not clear who hacked BK’s account, and I am not implying that it was a “competitor hack” (that is, it was not likely initiated by McDonald’s, or any potential rogue employee of that firm – although the Hamburglar’s criminal tendencies are well-established).

However, this hack has to fit squarely into one of two realms, and it provides a nice entrée to some new definitions for an evolving threat landscape.  Let’s create the concept of a “branded hack” that is unique to this forum – branded hacks that will be handles for discussion, and which will hopefully propagate for ease-of-discussion at orgs, with vendors, with media, etc.:  1)  Competitor-Hack (CH), and  2) Hack-at-Random (HaR).  This is a good opportunity to define these two types of hacks, for purpose of establishing exactly “where we are” in 2013, in getting to where we need to go – these definitions will likely evolve a bit:

New Definitions for New Realities

Competitor-Hack (CH):  This is a directed hack by a business competitor, with a business motivation:  The purpose of disrupting the competition’s ability to conduct competing business through harm to enablements (data, infrastructure, apps, etc.), or to cause damage to any specific competitor’s reputation (such as false Tweets, implanting of false content, false business positions, etc.).  These CHs can include political motivations, and political targets – they include any orgs and/or individuals who compete on some plane.

Hack-at-Random (HaR):  This is an attack that has more of a mischievous spirit as motivator.  Motivators can include humor, bragging rights, or even the preference of Big Macs over Whoppers, or Whoppers over Big Macs – but generally speaking, the people mounting these are not employees or formal representatives of the organizations in question – they are people who mount trouble for sport and fun.

Recognize this:  In discussing cybersecurity a few articles ago, as contained in this post, and as indicated in another post’s matrix, I mentioned that organizations would have to guard against CHs from business competitors.  I also debuted the concept of HaR.  It is easy enough for me to envision these things coming, as immodest as that may sound:  In the realm of risk, unmanaged possibilities become probabilities.

It is easy enough to see that risk is being compounded by three fundamental things that are being driven to everyone:

1)       Power

2)      Affordability

3)      Capability

Ever-more power, affordability, and capability are being driven to very modest “players” and devices.

Ever-more robust hacking tools will be available on rogue “gaming” sites, and the business and sport of hacking is going to explode.  Watch for it – and be positioned to guard against it.

2  Comments on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Seabreezes1
    "In the realm of risk, unmanaged possibilities become probabilities." That should be codified as a "law."  We've all seen it, bad decision making that deals with so many "urgent" items that provide short term gain, while serious risks that have yet to materialized remain at the bottom of the list. I dare say that most of us have on occasion prevented a serious disaster by individually pushing some item within our control through. However, the bigger issues require courage and initiative on a collaborative level. It may be easier to ignore big risks when dealing with them is costly, complex and requires collaboration.... but we do best to remember that survival demands courage.... 
    0 pointsBadges:
    report
  • FlimFlam
    Great post, as always! I wonder if hacks by gevernment entitites, like the Chinese military hacks against U.S. corporations would fall into your Competitor-Hack framework, or is that a whole different area, more cyber-espionage than malicious hacking?
    10 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: