Fibre-optic networks vulnerable to hacking

Hackers can access data by tapping the fibre-optic networks used by businesses around the world, according to an IDC report.

Fibre-optic cable networks are not as secure as believed - with new technology making it easy for hackers to steal data from them, according to an IDC report.

IDC research analyst Romain Fouchereau said that the reputation of a fibre-optic cable network as more secure than copper cables wasn't justified, and that new and inexpensive technologies have now made data theft easily possible for hackers without detection.

Advertisement - Article continues below

Organisations that carry sensitive information across fibre-optic cables are potentially vulnerable from criminal threats, as much of the cabling is easily accessible and not well protected. Fouchereau said that hacks on optical networks could be achieved simply by extracting light from ultra-thin fibres.

Once a successful tap has been achieved, software that records, monitors and analyses the data (called packet sniffers), can capture the data.

"Organisations in the financial, insurance, healthcare, and government sectors deliver sensitive information across fibre-optic cables around the world," Fouchereau said in the report.

"Hence, capturing or eavesdropping on this data serves not only military purposes. Industrial espionage in these sectors is worth billions of dollars."

The report also includes some past incidents of optical fibre networks being hacked, such as credit card breaches, government eavesdropping, and the criminal monitoring of big pharmaceutical companies in the UK.

Advertisement
Advertisement - Article continues below

Fouchereau said that as it was impossible to monitor the entire optical fibre network, the only solution to prevent it currently available is through encryption which would render the data useless to hackers.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/mobile/mobile-phones/355088/apple-lifts-iphone-purchase-restrictions
Mobile Phones

Apple lifts iPhone purchase restrictions

23 Mar 2020