Mossack, Fonseca and Co: How did the Hackers Leaked information?

The data breach of 11 million classified digital data files, approximately 2.6 TB of data, at the Panamanian legal firm Mossack, Fonseca, and Co has shaken the world to its core. Several data analysts and media experts have credited the data leak to whistle-blowers who wish to remain anonymous. Some others claim that the documents were stolen through a cyber-attack by cybercriminals.


Image: Pixabay

If the data breach was through whistle-blowers, like in the case of the Snowden incident, the Manning data breach, and going back to 1971-the Pentagon papers data breach, this recent incident once more emphasizes the domination of insiders as fundamental origins of data attacks on organizations’ vital and classified information sets. Across the world, almost every company spends substantial amounts of money to firewall their infrastructure against attacks from cyber terrorists or hackers. But most of the time, they have to confront the duality of efficaciously avoiding disclosure of information by the very workers who are required to employ the information for their daily tasks.


Most of the time, organizations are inadequately equipped with strategies to ensure that data is protected from insider threats. Such organizations are specifically defenseless against employees who have the means to access vital data and break the trust of their company by disseminating the information externally through surreptitious methods with media companies or selling it to trade rivals. These data damages can greatly hamper an organization’s productivity and repute.

In the case of the Panama papers leak, the first question that arose in the minds of many was how such a colossal amount of information got breached. As compared to previous data infringements, the Panama papers leak was vastly large information. The recipients of the data, namely journalists, took more than a year to analyze and examine it. In terms of computing terminology, 2.6 TB of data is not very big. That much amount of data can be hived away in any detect and prevent such data leaks, computing systems in organizations need to be configured to prevent classified data from being copied, moved, or printed. In some cases, organizations provide data access to employees to copy and store them on their personal devices; by controlling who has access to that information, insider leaks can be greatly diminished. Systems can also be configured to disable network connections when working with sensitive data files containing confidential information and prevent them from being shared online.

Author Bio: Carol is a professional blogger in the technology field. She is working with Locklizard, a reputed Digital Rights Management solution provider. They provide DRM security software. Visit their website www.locklizard.com for required details.

About author

I work for WideInfo and I love writing on my blog every day with huge new information to help my readers. Fashion is my hobby and eating food is my life. Social Media is my blood to connect my family and friends.
Related posts

In-Depth Guide for your Ease of Weed Purchasing Needs


Few Essential Benefits offered by SEO for Small Businesses




3 Tips to Fulfill Shopify Store Orders With Shopify Fulfillment App

Sign up for our newsletter and stay informed !