• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Commentary

The Panama Papers Signal A New Kind of Cyber Attack

By
Rajiv Gupta
Rajiv Gupta
Down Arrow Button Icon
By
Rajiv Gupta
Rajiv Gupta
Down Arrow Button Icon
April 9, 2016, 10:00 AM ET
Prime Minister David Cameron holds a Q&A session on the forthcoming European Union referendum with staff of PricewaterhouseCoopers on April 5, 2016 in Birmingham, England. The UK will vote on whether or not to remain in the European Union on June 23, 2016.
Prime Minister David Cameron holds a Q&A session on the forthcoming European Union referendum with staff of PricewaterhouseCoopers on April 5, 2016 in Birmingham, England. The UK will vote on whether or not to remain in the European Union on June 23, 2016.Christopher Furlong 2016 Getty Images

As a trove of leaked documents dubbed the ‘Panamanian Papers’ ripple across several nations, world leaders are feeling the heat. Russian President Vladimir Putin has called the exposure of offshore bank accounts an American plot, while Iceland named a new prime minister and British Prime Minister David Cameron admitted that he profited from an offshore trust. The Panama Papers represent the future of political scandal in the digital age – from the initial hack down to the cloud technology used to analyze the documents. Journalists Bob Woodward and Carl Bernstein, who famously took down Richard Nixon, could hardly have imagined working with millions of pages of confidential documents.

This generation’s Watergate will be conducted through shared folders and chatrooms. Mossack Fonseca, the hacked law firm, embodies the cyber risk to which many organizations have not yet woken up. Hackers are clearly after more than just credit cards and social security numbers. The breach is at once a glimpse into the brave new world of online leaks and a warning that all organizations should assume any sensitive information to be a potential target.

The Panama Papers is 1,500 times the size of Wikileaks’ 2010 disclosure, and the largest leak journalists have ever worked with and one distinctly belonging to the digital era. The sheer amount of data stolen could only logistically happen through an online hack: 11.5 million files totaling 2.6 terabytes equates to loads of books requiring 2,600 pickup trucks! Modern whistleblowers no longer have to sneak documents out of the office in a manila folder. They can extract an entire database to comb through remotely. The data dump of nearly every document from law firm Mossack Fonseca from the past 40 years represents what one journalist calls the Moore’s Law of Leaks, suggesting that disclosure sizes will grow at an exponential rate analogous to that of computing power.

The complex technology and execution behind the Panama Paper’s investigative operation would make any software architect proud. The journalists handling the data employed the latest information technology tools to download, share, and protect a huge database of sensitive information – a feat many companies would be challenged to accomplish. Initial outreach between whistleblower and journalist took place via encrypted messages. The team stored the photos encrypted in the cloud while journalists collaborated on findings in secure chat forums. Maligned by the government as a tool enabling terrorism, the use of encryption throughout this process validates claims of its application protecting privacy and political dissent.

The anonymous whistle-blower’s actions certainly resonate with anti-corruption principles, having revealed illegal and immoral activity from politicians and other public figures. The episode also raises concerns about privacy and the role of “hacktivism,” cyberattacks that are politically or ideologically motivated. Publicly releasing the entire cache of documents, as some have called for, calls into question the right to privacy of Mossack Fonseca clients, especially those who may not have committed illegal activity or do not hold public office. “Hacktivism” inherently takes decision-making away from the legal system. What happens when “hacktivists” act on behalf of principles or entities we consider deplorable or dangerous? Should the abuse of privacy of the innocent be considered unfortunate but necessary collateral damage? The Panama Papers demonstrate a new power for whistle blowers. Their legacies will depend on their judgment in wielding it.

Public figures are not the only ones now worried about their secrets. Mosack Fonsecca essentially exposed all of its sensitive client information, ruining its reputation for confidentiality. In the wake of this failure, every company is likely reevaluating the security of data and who they trust to store it.

It is tempting for organizations to view cybersecurity through a financial lens: social security numbers and trade secrets are valuable to hackers, but other data would not be worth their while to steal. Politically or ideologically motivated hackers are the wild cards of this risk formula. The Panama Papers theft forces organizations to assume that any sensitive information is a potential target for hackers, and that attackers could be driven by incentives other than purely financial. In other words, security’s task expands from guarding “what we think they want” to “what we do not want them to know.”

The greatest uncertainty lies with the data a company does not store itself. Every organization has partners with which it shares sensitive information. The average company exchanges data online with 1,555 partners, and not every partner will satisfy the security requirements that a bank or retailer requires. What makes matters worse is that one partner will often serve multiple corporations. The hack of a single online photo vendor affected customers of nearly all of the top North American drug store brands.

Then there are partners who receive a high concentration of confidential data. Mossack Fonseca stored a treasure trove of individuals’ financial secrets. How many companies store stockpiles of corporate secrets? Whether it is legal documents, intellectual property, or financial data, companies deal with information that would prove very troublesome if it fell into the wrong hands, like competitors or the public. As hackers’ methods and motives grow more complex, they are targeting information beyond the standard personally identifiable information (PII) that can be easily monetized.

Exemplifying this trend, anonymous sources revealed several top US legal firms suffered data breaches, with insiders suspecting hackers may have been after information to prey on many organizations. Mossack Fonseca’s was anything but an anomaly, as one senior partner reported, “Law firms are being deluged with attempts to crack their systems.” If the Target breach showed that hackers can use business partners to gain entry into corporations, these attacks demonstrate that business partners themselves now have information hackers want. In an unrelated incident, criminals hacked newswire services targeting the unreleased financial information in uploaded press releases.

How will the business landscape change in a world where organizations need to worry not only about their own cybersecurity, but that of the company sending out their press releases? Nearly half of companies do not evaluate the risk of vendors before transferring them data, but change may be underway. Law firms report facing more diligent scrutiny of their security capabilities, but all industries should pay attention to the missteps of Mossack Fonseca. The Panamanian firm employed outdated software with critical vulnerabilities, including that for its customer portal.

While the motives behind political leaks can be hard to predict, attacks on basic vulnerabilities are not. It will become harder for companies who handle sensitive information to get away with poor security practices.

The Panama Papers incident points to a brave new world in which no organization is a digital island. Every organization is at potential risk from every one of the bridges that connects it to others, and a cybersecurity lapse across any one of these bridges can become an existential threat.

Rajiv Gupta is CEO of Skyhigh Networks.

About the Author
By Rajiv Gupta
See full bioRight Arrow Button Icon

Latest in Commentary

Julian Braithwaite is the Director General of the International Alliance for Responsible Drinking
CommentaryProductivity
Gen Z is drinking 20% less than Millennials. Productivity is rising. Coincidence? Not quite
By Julian BraithwaiteDecember 13, 2025
12 hours ago
carbon
Commentaryclimate change
Banking on carbon markets 2.0: why financial institutions should engage with carbon credits
By Usha Rao-MonariDecember 13, 2025
13 hours ago
Dr. Javier Cárdenas is the director of the Rockefeller Neuroscience Institute NeuroPerformance Innovation Center.
Commentaryconcussions
Fists, not football: There is no concussion protocol for domestic violence survivors
By Javier CárdenasDecember 12, 2025
1 day ago
Gary Locke is the former U.S. ambassador to China, U.S. secretary of commerce, and governor of Washington.
CommentaryChina
China is winning the biotech race. Patent reform is how we catch up
By Gary LockeDecember 12, 2025
1 day ago
millennial
CommentaryConsumer Spending
Meet the 2025 holiday white whale: the millennial dad spending $500+ per kid
By Phillip GoerickeDecember 12, 2025
1 day ago
Sarandos
CommentaryAntitrust
Netflix, Warner, Paramount and antitrust: Entertainment megadeal’s outcome must follow the evidence, not politics or fear of integration
By Satya MararDecember 12, 2025
2 days ago

Most Popular

placeholder alt text
Economy
Tariffs are taxes and they were used to finance the federal government until the 1913 income tax. A top economist breaks it down
By Kent JonesDecember 12, 2025
2 days ago
placeholder alt text
Success
Apple cofounder Ronald Wayne sold his 10% stake for $800 in 1976—today it’d be worth up to $400 billion
By Preston ForeDecember 12, 2025
1 day ago
placeholder alt text
Success
40% of Stanford undergrads receive disability accommodations—but it’s become a college-wide phenomenon as Gen Z try to succeed in the current climate
By Preston ForeDecember 12, 2025
1 day ago
placeholder alt text
Economy
The Fed just ‘Trump-proofed’ itself with a unanimous move to preempt a potential leadership shake-up
By Jason MaDecember 12, 2025
1 day ago
placeholder alt text
Economy
For the first time since Trump’s tariff rollout, import tax revenue has fallen, threatening his lofty plans to slash the $38 trillion national debt
By Sasha RogelbergDecember 12, 2025
1 day ago
placeholder alt text
Success
Apple CEO Tim Cook out-earns the average American’s salary in just 7 hours—to put that into context, he could buy a new $439,000 home in just 2 days
By Emma BurleighDecember 12, 2025
1 day ago
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.