© Copyright Acquisition International 2026 - All Rights Reserved.

Article Image - Cyber Criminals Target M&A  Negotiations
Posted 22nd June 2015

Cyber Criminals Target M&A Negotiations

We hear from Stuart Poole-Robb, Chief Executive of the security, business intelligence and cyber security adviser, the KCS Group Europe.

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Cyber Criminals Target M&A Negotiations
Image

Cyber Criminals Target M&A Negotiations

We hear from Stuart Poole-Robb, Chief Executive of the security, business intelligence and cyber security adviser, the KCS Group Europe.

Industry predictions that a growth in the number of merger and acquisitions (M&A) deals would attract the unwanted attention of international organised criminal gangs (OCGs) are proving correct.

Last year, Ernst & Young (now known as EY) predicted that, as M&A activity increases, there will be more scope for cyber criminals to use increasingly sophisticated malware of the kind that is available on the Dark Web to influence the negotiation strategies and pricing of major transactions, either working directly for a party on either side of the transaction or simply as observers taking positions based on the outcomes.

Large law firms are now being targeted by OCGs, particularly during M&A discussions, where the legal firm and the negotiating parties typically open their systems to each other whilst transmitting vast amounts of confidential data to one another over the Internet. Former low-level hackers have also become increasingly ambitious in the last 12 months as the internet’s mirror economy, the Dark Web, has become an increasingly sophisticated marketplace for stolen data.

“We’re all used to criminals stealing identities and credit card information to sell on the black market. But in recent years, as more and more of this information has flooded the market, the price earned per record has dropped to the level where it’s not worth stealing any more,” says Jamie Graves, chief executive of cyber security software developer ZoneFox, a partner of KCS Group Europe.

He adds: “As a result, criminals are targeting organisations with other, higher value, information. This can be seen in the recent spate of healthcare breaches, and it will also be a trend in the legal sector, where security is traditionally relaxed, but a great deal of very sensitive information can be stolen for the purpose of blackmail, fraud, and other activities.”

OCGs are also realising that sensitive information at a corporate level has a very real market value to many large corporates, who do not always to enquire too closely into how such market-sensitive data was originally obtained.

According to Graves: “Certain unscrupulous corporates have also realised that legal practices are honeypots for extremely sensitive information that can be used to inform them of commercial matters that, should they be disclosed, would have a significant effect on legal proceedings, a merger or acquisition, or other commercially sensitive activities.”

This kind of cyber breach is far harder to detect and prosecute than, for example, a cyber-breach that is followed directly by a fraudulent funds transfer. By appearing to conduct legitimate industry research for a major organisation involved in potential M&A negotiations, the OCG can seem to be involved in a legitimate business activity; this is a process known as ‘data laundering’. Should the OCG decide to profit from the illegally obtained information by insider market trading on its own account, the crime is hard to detect and even harder to prosecute, particularly in the case of criminals based in a country which may be on a different continent from the city where the cyber breach occurred.

Law firms are now seen as particularly vulnerable to this type of attack as large organisations in other sectors, such as finance, start to shore up their cyber defences.

“Legal firms need to wise up to the fact that threat-actors are going after valuable low-hanging fruit, and, since the banks have been investing a great deal in security, their practices are likely to be next,” says Jamie Graves.

Some legal firms are already not only improving their own IT security but are also realising that a crucial part of their role is helping clients deal with the growing security risk now associated with situations such as M&A negotiations.

According to Andrew Cheung, General Counsel UKMEA at global law firm Dentons: “The global risks that our clients need to tackle are increasing in complexity, variety, impact and number. To meet these increasingly complex risks, clients should be able to demand more than simply good legal advice from their lawyers. Dentons recognises that we also need to consider the success of our clients’ projects, goals and transactions as a whole.”

Many law firms, however, still live in a state of blissful ignorance as to the growing level of risk they and their clients face from cyber criminals. While the malware used by OCGs has become increasingly sophisticated over the past 12 months, the legal profession overall has not generally managed to keep pace.

The OCGs themselves now deploy malware variants that are routinely sold on the Dark Web, where all kinds of illegal services and goods are available – at a price. According to Russia-based research organisation Kaspersky Labs, cyber criminals are now developing over 300,000 new and unique variants of malware every day. In Russia alone, the market in this type of illicit malware is reported be worth around US$2 billion a year. OCGs are also taking increasing advantage of the fact that the Russian authorities are unwilling to prosecute anyone inside Russia for cyber breaches that occur elsewhere.

According to Interpol: “Traditional OCGs, including those with a mafia-style structure, are beginning to use the service-based nature of the cybercrime market to carry out more sophisticated crimes, buying access to the technical skills they require.” In some cases, even trained state cyber experts in some countries are being encouraged to moonlight, knowing full well they won’t be caught or prosecuted.

Too many legal firms still rely on old-fashioned anti-virus and password protection. This is essentially 20th Century security that stands little or no chance of stopping a determined and co-ordinated cyber attack using modern malware, which often sits undetected on an IT system for months or even years.

Law firms and their corporate clients therefore need to deploy cyber security software capable not only of recognising incoming threats, but also detecting whether an IT system has already been compromised and whether confidential and market- sensitive data is already being put up for sale on the Dark Web.

Categories: Innovation


You Might Also Like
Read Full PostRead - Eye Icon
IdeaScale Acquires InnovationManagement.se to Enhance Comprehensive Innovation Offering
Innovation
10/02/2016IdeaScale Acquires InnovationManagement.se to Enhance Comprehensive Innovation Offering

IdeaScale, the California-based innovation management solution, today announced its acquisition of InnovationManagement.se (IM), the world's leading platform for cutting-edge innovation management content, best practices and online training programs.

Read Full PostRead - Eye Icon
Best Practices to Minimize VAST Error Codes in Video Advertising
News
11/12/2023Best Practices to Minimize VAST Error Codes in Video Advertising

The landscape of digital advertising is witnessing a monumental shift, propelled by the dynamic and immersive world of video advertising. In this industry, the video ad serving template (VAST) is a pivotal framework for managing the seamless delivery of video

Read Full PostRead - Eye Icon
Why the Fintech Industry is Migrating to the Cloud
Finance
02/03/2023Why the Fintech Industry is Migrating to the Cloud

If you've been keeping up with the latest news in the fintech world, you might have noticed a common theme: more and more companies are moving their operations to the cloud. In fact, according to Mckinsey & Co, 54% of financial institutions expect to shift at

Read Full PostRead - Eye Icon
Unlocking Seamless Communication: Mastering SharePoint Calendar for Large Enterprises
News
18/09/2023Unlocking Seamless Communication: Mastering SharePoint Calendar for Large Enterprises

In today’s hyper-connected corporate world, having robust, adaptable, and user-friendly tools is non-negotiable. SharePoint Calendar is one such indispensable tool, stemming from Microsoft’s SharePoint—a platform that has been redef

Read Full PostRead - Eye Icon
3 Best Trading Strategies
News
18/01/20223 Best Trading Strategies

Are you looking for a way to make money? Well, the good news for you is that you are living in the 21st century. Modern technology and the online world have allowed us to improve our financial stability.

Read Full PostRead - Eye Icon
The Minds Behind the New Era of Grant Management
Innovation
07/10/2021The Minds Behind the New Era of Grant Management

Now with the title of ‘Best Online Application Management Solutions Firm’ for 2021 under its belt, USA based company ZoomGrants has been secured in its place as the leader of grant management software solutions. Combining top of the line technology with un

Read Full PostRead - Eye Icon
IoT in Transportation Market Worth $143.93 Billion by 2020
Finance
21/04/2015IoT in Transportation Market Worth $143.93 Billion by 2020

The IoT in Transportation Market is expected to reach $143.93 Billion by 2020 at an estimated CAGR of 8.95% from 2014 to 2020.

Read Full PostRead - Eye Icon
International engineering consultancy Thornton Tomasetti to acquire MMI Engineering
Leadership
14/06/2018International engineering consultancy Thornton Tomasetti to acquire MMI Engineering

Thornton Tomasetti, the international engineering consultancy, has agreed to acquire MMI Engineering (“MMI”), the technical consulting specialist focused on the risk management of man-made and natural hazards across the oil and gas, nuclear, utilities and

Read Full PostRead - Eye Icon
Technology Transactions
Innovation
29/06/2016Technology Transactions

As with many sectors, the value of technology transactions was impressive during the second half of 2015. In all USD 319,086 million-worth of deal making was recorded over the six months.



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have a number of unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow