The Art of (Cyber) War

The Art of (Cyber) War

“Avoid what is strong and strike at what is weak”- Sun Tzu

Some trues are timeless – what was true when fighting a traditional combat war is true for Cyber warfare as well.

In numerous incident reports that I’ve reviewed, the first item usually included some variation of the phrase - “First entry point was probably falling prey to a phishing attack”. The level of confidence of that statement usually differs, depending on the professional integrity of the analyst (as phishing attack seems to be the “default” option).

When an attacker evaluates his next target, he would usually conduct a reconnaissance phase (assuming it’s not just a high-volume attack campaign). Once completed, the attacker will have a full “inventory list” of the security measures taken – vendors, versions etc., he can then decide to go “head-to-head” with those security products or follow Sun Tzu’s advice, realizing that Cyber security products are getting better (and stronger) in the protection they offer.

Following Sun Tzu’s guidelines pushes the attacker to find alternative options – and HW/FW vulnerabilities seems to be the weakest link. As shown on multiple cases, exploiting a wireless HID device vulnerabilities can bypass multiple security measures, and send the end-point to a URL where part of the malicious code is waiting to be executed, without the need for human user actually “clicking” on a link and without having to confront all those security content scanners.

In the aftermath the blame will fall on an employee that presumably clicked on a link that he shouldn't have clicked - resulting in more awareness campaigns and implementing additional Phishing detection solutions.

In summary, on your next incident, consider other entry options as well, where the first move was done maybe by someone sitting in your company’s lobby, passing through or even flying a drone next to your window with a Raspberry PI running Jackit payload.

祝好運

#roguedevicemitigation

Adam Avnon

Owner at Plan(a-z) | Leading Marketing & Business Dev. for premium brands | Ex. CEO of Y&R Israel

4 个月

????? ??? ???? ????? ?????? ????? ??????: https://bit.ly/3C8puqQ

回复

Bentsi - This is really good information... and right on.? One thing that would help is a fully scalable, fluid deception platform that can scale from tens, to thousands of deception hosts with our patented reflection technology.? ShadowPlex delivers a whole new level of deception capabilities. ? "All Warfare is based on Deception." -Sun Tzu

回复

Never disrespect your opponent, and never assume that the next attack will be a replica of the previous one - they are smarter than that! The use of rogue devices opens up a whole new world to the attackers, and we can not afford to let them dominate it. #roguedevicemitigation?

要查看或添加评论,请登录

Bentsi Ben-Atar的更多文章

  • The return of the "Polish" virus?

    The return of the "Polish" virus?

    20 years ago, there was a joke going around - in which you may have received the following message - You have just…

    4 条评论
  • ATM Security

    ATM Security

    Don't make any plans for Sep. 19th.

    4 条评论
  • Shaken, not stirred.

    Shaken, not stirred.

    When we discuss possible attack vehicles with potential customers – we occasionally get that look which says "Guys, we…

    3 条评论
  • The "Giveaway" that gives your data away..

    The "Giveaway" that gives your data away..

    We've all been there, you walk the floor on a certain expo – and then it catches your eyes! A bowl full of…

    2 条评论
  • ATM Hacking for dummies

    ATM Hacking for dummies

    Another great example of how a simple hardware device can cause significant damage - Obviously if they only had Sepio…

社区洞察

其他会员也浏览了