• Interviews
  • Fashion & Watches
  • Gourmet & Travel
  • Lifestyle
  • Next Gen
  • Events
  • Interviews
  • Fashion & Watches
  • Lifestyle
  • Events
  • Gourmet & Travel
  • The Peak Exclusives
    • The Peak Power List
    • The Peak Next Gen
Subscribe Now!
  • Also available at:
Privacy Menu 1
SPH Magazine

MCI (P) 089/12/2021. Published by SPH Media Limited, Co. Regn. No. 202120748H. Copyright © 2022 SPH Media Limited. All rights reserved.

  • Interviews
  • Fashion & Watches
  • Gourmet & Travel
  • Lifestyle
  • Next Gen
  • Events

Lifestyle

Why billionaires like Jeff Bezos are prime targets for hackers

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Lifestyle

Why billionaires like Jeff Bezos are prime targets for hackers

Hackers are not necessarily trying to breach the walls of the castle – they are already inside, residing on personal devices.

by Luc Olinga   /   February 12, 2019

The stunning revelation that a tabloid obtained below-the-belt selfies of Amazon founder Jeff Bezos – the world’s richest man – suggests that even billionaires are not out of the reach of hackers.

Bezos came out fighting this week, accusing the National Enquirer of blackmailing him with lurid pictures of him and his mistress, and pre-empting the threat to publish by releasing details of the images himself.

I’ve written a post about developments with the National Enquirer and its parent company, AMI. You can find it here: https://t.co/G1ykJAPPwy

— Jeff Bezos (@JeffBezos) 7 February 2019

(Related: How to protect yourself from falling prey to phishing emails)

But for Mark Johnson, CEO of Sovereign Intelligence, the incident makes clear that “no one is beyond the reach of cyber exploitation.”

“It’s a curious irony that billionaires demonstrate astounding acumen related to their own industries, and yet seemingly ignore the minutiae of common-place security measures.”

Johnson sees billionaires and top executives as especially vulnerable because their personal information is a gold mine for criminals, intelligence agencies and competitors.

“Obtaining their personal data is like having keys to the kingdom,” said Johnson, potentially providing priceless insight into the thinking and strategies of the world’s most powerful business leaders.

Ian Bremmer, the founder of the Eurasia Group think tank, put it more bluntly.

“If the National Enquirer has @JeffBezos dick pics, don’t tell me China doesn’t have @Amazon IP and strategy,” he tweeted.

Increase in calls

Since the revelations about Bezos, whose fortune is estimated at more than $130 billion, computer security experts interviewed by AFP report an increase in calls from wealthy clients asking them to verify that their computer systems and devices were not hacked.

“Today’s threats however are not necessarily trying to breach the walls of the castle – they are already inside, residing on personal devices,” said Kris Coleman, the founder of Red Five Security. “Experience has shown that the typical breach is not discovered for eight months.”

In this ever-more connected age, more and more personal data is stored online – from social security numbers to bank details, driver’s license numbers and personal addresses.

As a result the focus of security measures for the ultra-wealthy has shifted from bodyguards and sophisticated alarms towards risk management to protect their assets, their image and their “legacy.”

The super-wealthy will typically have their own computer security service and also call on external companies for regular evaluation of their devices because a large number of hacks are detected by third parties, according to observers.

Mark Zuckerberg, Facebook’s CEO, spent $7.3 million on his security in 2017, up from $4.2 million in 2015 – astronomical sums that the social network deemed justified due to his prominence.

Last July, Facebook said it would give him $10 million more per year to strengthen his security.

“Protection from colluding insiders working from positions of trust; or, against an intelligence agency trying to attack from the outside is going to require a large investment, a lot of experience, and vigilance,” said Coleman.

(Related: Don’t go in unprotected – take these cybersecurity steps)

Entourage

For Johnson, “no one’s data is that well protected. Think of all the third-party platforms that have your social security number, or banking information, or that hold your personal pictures.”

Just days before Bezos disclosed that a tabloid had obtained his intimate selfies, a fellow billionaire – Joe Ricketts, the founder of the broker TD Ameritrade Holding Corporation — was ensnared in scandal following the release of private messages.

The American news site Splinter published a series of racist emails from Ricketts, without saying how it obtained them.

The exchanges, some of which date back to 2009, show the 77-year-old sharing and apparently endorsing racist jokes and conspiracy theories. He has since apologised.

Back in August 2015, a cyber attack on the Ashley-Madison extramarital dating site revealed that American billionaire Dan Loeb had an account there.

Bezos did not say how the National Enquirer obtained his pictures, but experts say the most common method is for a hacker to usurp the identity of a member of a person’s entourage.

“The adversary would send a message to the target asking them to click on a link in a text or email,” Coleman explained. “The sender’s real identity is hidden but the target trusts the message from their ‘friend’ and clicks the link unlocking malware or another type of attack on that device.” – AFP Online News

(Related: How to prevent a Panama Papers-like hack in your company)

Photo: Jim Watson/AFP File

  • TAGS:
  • Amazon
  • Billionaires
  • Cyber security
  • jeff bezos
SHARE THIS ON

Trending

Lifestyle

Everyone’s favourite foldable bike just got much lighter

Lifestyle

Alex Chua and Zabriel Sim: In pursuit of greatness

Lifestyle

What in the world is paddle tennis and pickleball?

Lifestyle

Devialet partners with the Opéra National de Paris to deliver a l...

Lifestyle

Earth’s Black Box will outlast the planet itself

Lifestyle

How Fang Low, founder of Figment, approaches interior design

Lifestyle

House Tour: A Good Class Bungalow that’s built around mature tree...

Lifestyle

Melati Drinks founder Lorin Winata believes the future is non-alc...

Lifestyle

House Tour: A courtyard tropical home with an inverted roof in Jo...

Lifestyle

House Tour: A Bukit Timah landed home with Escher-like spatial ex...

Lifestyle

Promising start-ups now get a leg up with e-commerce aggregator, ...

Lifestyle

Breezy vibes in Vivienne Shen’s conservation shophouse

Editor’s Picks
  • Lifestyle Everyone’s favourite foldable bike just got much lighter
  • Lifestyle Alex Chua and Zabriel Sim: In pursuit of greatness
  • Interviews The Peak Next Gen: Valerie Lim, national director of Miss Universe Singapore
  • Interviews The Peak Next Gen: Venture capitalist Shaun Hon of Motion Ventures
  • Interviews How entrepreneur Samson Oh rose from poverty to build an esports and gaming e...
  • Interviews Self-made tech millionaire Alvin Poh is back to help other entrepreneurs scal...
Newsletter Subscribe
Enjoy in-depth interviews from business leaders, profiles on Singapore's movers and shakers,
sharp commentary, and more in your inbox every week.

Will be used in accordance with our Privacy Statement
Footer Menu
  • About Us
  • ADVERTISE WITH US
  • Contact
  • CONDITIONS OF ACCESS
  • PDPA
  • PRIVACY POLICY
?>
SPH Media

MCI (P) 089/12/2021. Published by SPH Media Limited, Co. Regn. No. 202120748H. Copyright © 2022 SPH Media Limited. All rights reserved.