Fibre-optic networks vulnerable to hacking

Hackers can access data by tapping the fibre-optic networks used by businesses around the world, according to an IDC report.

Fibre-optic cable networks are not as secure as believed - with new technology making it easy for hackers to steal data from them, according to an IDC report.

IDC research analyst Romain Fouchereau said that the reputation of a fibre-optic cable network as more secure than copper cables wasn't justified, and that new and inexpensive technologies have now made data theft easily possible for hackers without detection.

Organisations that carry sensitive information across fibre-optic cables are potentially vulnerable from criminal threats, as much of the cabling is easily accessible and not well protected. Fouchereau said that hacks on optical networks could be achieved simply by extracting light from ultra-thin fibres.

Once a successful tap has been achieved, software that records, monitors and analyses the data (called packet sniffers), can capture the data.

"Organisations in the financial, insurance, healthcare, and government sectors deliver sensitive information across fibre-optic cables around the world," Fouchereau said in the report.

"Hence, capturing or eavesdropping on this data serves not only military purposes. Industrial espionage in these sectors is worth billions of dollars."

The report also includes some past incidents of optical fibre networks being hacked, such as credit card breaches, government eavesdropping, and the criminal monitoring of big pharmaceutical companies in the UK.

Fouchereau said that as it was impossible to monitor the entire optical fibre network, the only solution to prevent it currently available is through encryption which would render the data useless to hackers.

Featured Resources

Become a digital service provider

How to transform your business from network core to edge

Download now

Optimal business results with the cloud

Evaluating the best approaches to hybrid cloud adoption

Download now

Virtualisation that enables choices, not compromises

Harness the virtualisation technology that's right for your hybrid infrastructure

Download now

Email security threat report 2020

Four key trends from spear fishing to credentials theft

Download now

Recommended

How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

15 Jan 2021
Hackers using COVID vaccine as a lure to spread malware
hacking

Hackers using COVID vaccine as a lure to spread malware

15 Jan 2021
Cyber criminals bypassing MFA to access cloud service accounts
two-factor authentication (2FA)

Cyber criminals bypassing MFA to access cloud service accounts

14 Jan 2021
Weekly threat roundup: Microsoft Defender, Adobe, Mimecast
vulnerability

Weekly threat roundup: Microsoft Defender, Adobe, Mimecast

14 Jan 2021

Most Popular

What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021
150,000 arrest records accidentally deleted from police database
data management

150,000 arrest records accidentally deleted from police database

15 Jan 2021
Can Pat Gelsinger get Intel back on track?
chief executive officer (CEO)

Can Pat Gelsinger get Intel back on track?

13 Jan 2021