The ascent of Slack in the business environment
In the world after the pandemic, communication technology is essential for workplaces to operate, and daily, numerous professionals begin their mornings by logging into Slack.
The widely-used messaging app based in the cloud is ubiquitous. Since its launch in 2013, Slack has gained 38.8 million users, with businesses comprising 77% of the Fortune 100 utilizing the service.
Security has consistently been a concern for the company, and Slack is currently embroiled in a new cybersecurity scandal. Thousands of Disney’s internal messages were exposed following a 1.2 terabyte breach orchestrated by the self-identified activist group NullBulge.
Slack, a communication company owned by Salesforce, played a significant role in the breach. The majority of the leaked information originated from the Slack platform. The exposed data comprised images, computer code, logins, unreleased project details, studio technology, advertising campaigns, and information about job applicants.
Tackling security weaknesses in Slack
The history of cybersecurity incidents involving Slack
This Disney data breach is just one of five recent cyberattacks linked to Slack. Companies such as Uber, EA Games, Grand Theft Auto (Rockstar Games), Twitter/X, and even Slack itself have been affected by these Slack-based hacks, highlighting security concerns for the .5 billion dollar company.
The extensive usage and substantial data storage on Slack make it an appealing entry point for hackers aiming at major corporations. Companies involved in these breaches faced significant economic and business repercussions.
- Uber experienced damages amounting to millions due to a breach in their #general Slack channel.
- EA Games: Hackers published 780GB of data on a cybercrime forum.
- Footage from Rockstar Games’ Grand Theft Auto was leaked, resulting in a recovery cost of millions.
- Twitter/X: A leak of 130 high-profile accounts resulted in a 4% decrease in stock price.
- Slack: Hackers took control of thousands of active accounts, resulting in a loss of $0.9 million.
The majority of Slack chat channels are accessible to all users; one compromised account can potentially expose everything.
Account compromises and external risks
Slack credentials are frequently compromised. A report from the cybersecurity company KELA identified over 17,000 credentials linked to 12,000 unique Slack workspaces that had been listed for sale on various dark web and hacker forums.
Another major concern is that Slack provides third-party app integration to help organizations use the platform more efficiently. These third-party apps pose a considerable supply chain risk since many require extensive permissions. Even what appears to be an harmless request to “read from all public channels” can grant access to vast amounts of data.
Primary Slack security vulnerabilities
- Data retention: Slack maintains all data permanently. This includes messages, login information, and any file uploads.
- Integration with third parties: One of Slack’s major advantages but also a significant risk. Sensitive information stored in Slack might be accessed by potentially unsecure third-party applications.
- System vulnerabilities: Hashed passwords were exposed for five years until 2022. Safety is not a strong point for Slack; this oversight resulted from insufficient monitoring.
Expert perspectives
Diane M Janosek pointed out that while online collaboration tools like Slack help businesses operate swiftly and efficiently, they also come with security challenges due to the widespread use of personal work devices. Shawn Loveland mentioned that “Slack has vulnerabilities that customers need to monitor and mitigate accordingly.”
“Loveland notes that any cloud collaboration tool can present a hacking threat, with the majority of malicious access resulting from malware-infected employee devices.”
Both professionals encourage the ongoing use of Slack for business needs as long as the company consistently monitors security for any cloud collaboration software.
Tackling Slack’s security vulnerabilities is crucial for Australian companies that depend on the platform for their everyday activities. The initial step is to establish strong security measures, such as multi-factor authentication (MFA) and frequent password changes. MFA enhances security by introducing an additional layer, thus making it harder for unauthorized individuals to access the system.
Additionally, companies ought to perform routine security assessments to detect and address potential vulnerabilities. Such evaluations can assist in identifying system weaknesses and confirming that all security protocols are current. Moreover, it’s essential to inform employees about the significance of cybersecurity and their contribution to its upkeep. Frequent training sessions can enable staff to spot phishing attempts and other prevalent cyber threats.
Another important element is handling third-party app integrations. Although these apps can boost efficiency, they also present considerable security threats. Companies should thoroughly evaluate any third-party apps before incorporating them into their Slack workspace. This involves examining the app’s security policies and ensuring they meet industry standards.
Data retention policies need to be reviewed as well. Slack’s standard setting retains all data forever, presenting a valuable target for hackers. Companies ought to think about establishing data retention limits and consistently deleting outdated data to reduce the volume of sensitive information kept on the platform.
In conclusion, companies must have a response strategy prepared for any potential security breach. This strategy should detail the immediate actions to take once a breach is identified, such as informing impacted individuals and collaborating with cybersecurity professionals to control and reduce the harm.
By implementing these preventive actions, Australian companies can enhance their defenses against the escalating threat of cyberattacks on platforms such as Slack. Although no system is completely infallible, a thorough cybersecurity strategy can greatly diminish the risk and consequences of possible intrusions.