Thinking Bad for the Sake of Good

Thinking Bad for the Sake of Good

Having and Using Attacker Mindset Doesn’t Have to be Bad. 

Mental diversity in terms of security can make our communities and companies safer. However, if no one is actually thinking like the attacker then we are essentially fighting an invisible, unknowable force – and how can you win when you’re up against such an entity? In The Art of Attack, out June 2nd 2021, I argue all companies, organizations and agencies should: 

A) employ tactical and combative methods internally through attacker mindset to identify security gaps  

B) be willing to change, employing corporate humility, to mitigate vulnerabilities and security gaps 

This is the simple formula that explains how the most secure companies do the impossible and remain ahead of attackers. Innovative companies use it to change their position from defensive to offensive. Resilient companies use it to become antifragile. But all companies require it. Additionally, we are all at risk if the companies we interact with don’t employ this mindset in their security programs. 

Companies and government alike must always be able to identify dangerous shortcomings and react to any glaring limitations in short course. If they can't or aren't trying, they aren’t being proactive. They aren’t invested in security. Yours, mine or their own.  

THINKING LIKE AN ATTACKER ISN’T BAD; TEACHING IT TO THOSE THAT DON’T WISH TO HARM US, BUT TO PROTECT US, WILL GREATLY IMPACT OUR SUCCESS IN INFORMATION SECURITY GOING FORWARD.  

The following post is a brief overview of what Attacker Mindset (AMs) is and why it’s important for the future success of security. 

AMs is all around us, it’s usually referred to as “expertise.” Great athletes have it – they know their opposing team, they know their strengths, they have a play. Great lawyers have it – they know the law and they apply a narrative to work with it and win any given case. We’re going to explore AMs through the lens of security and labeling that with something as broad in definition as “expertise” would be counterproductive. Attacker mindset in security is acting like the enemy for the long term good of a company or organization. It is a set of cognitive skills applied to four laws.

Cognitive skills: 

  • Curiosity 
  • Persistence 
  • Leveraging Information 
  • Self-Awareness 


The Four Laws: 

1. Weaponizing information for the good of the objective

2. Every action taken must be in support of the objective

3. Pretext can never be broken* 

4. Start with the end in mind 

*This law (3) actually means that the attacker is never “themselves”. They are always in character for the sake of the second law. 

Engaging and operating under this mindset means interpreting a set of circumstances from it in a fixed way, but never allowing it to lead to a fixed result. 

WHY DO WE NEED IT? 

Think like the bad guys with the intent of the good guys. 
No alt text provided for this image

This untangling and laying out of AMs is not to teach people to be malevolent or immoral; It’s actually a bid to teach security professionals to be ethical and virtuous – testing people, companies and security for our greater good.  Teaching the attacker mindset to those that don’t seek to harm us, but to protect us, will greatly impact our successes in information security going forward. These people should be allowed to test the rest of the business population before the real bad guys do (as an internal source or external). By enabling this, we allow the improvement of security, offensively and defensively, by allowing businesses to see their environments objectively. A lack of offensive strategy is the defining threat of our generation; Analysis through sharp AMs solves this. 

The greatest and sharpest attackers are trained to see opportunities in the moment and there’s no way to list the infinite opportunities an (ethical or otherwise) attacker might happen across, but what AMs should teach is this: how to form the mindset and how to apply it. If a company is not looking at themselves through the lens of an attacker, they are not serious about security.


CRITICAL THINKING AND AMs 

CRITICAL THINKING CANNOT BE BRANDED. 

Critical thinking can be thought of as the ability to identify a problem and solve it using logic and creative reasoning. Where information is concerned, critical thinking is the ability to analyze information through consciously controlled logic, or thorough examination of a problem. Critical thinking is the intersection of visual memory, attention span and the prediction of consequences coming together to drive decision making. 

This brings us to the overlapping topic of critical thinking in the professional workplace and as a feature of AMs. “Critical thought” is–annoyingly–a trending buzzword at the moment. It’s desirable in most professional offices, but almost certainly being conducted in the antithesis of its core role more often than not; being told to critically think to reach some arbitrary conclusion by your superiors, teammates or any other faction within you working environment is the great suppressor of critical thinking. What you are actually being told to do it perform a culturally subjective analysis. I am against this in its entirety. If you have gotten into the habit of this and think that your critical thought should lead you to the same conclusions as those of your peers or co-workers, you may have to work to undo this thought process. Ams will thrive through this sort of mental shift.

Critical thinking interwoven with your attacker mindset is powerful. 

As an aside, in a brilliant study by Google on high performing teams, psychological safety was a bolstering factor of a strong, effective team. If a team member cannot overcome a mistake quickly, without fear of persecution from other team members or management, then it will break down and ultimately become unproductive. The same is true for red teams, blue teams, social engineering teams and all that employ AMs. So thinking critically cannot cannot be “branded” or culturally aligned and it cannot be punished. It’s only a good thing.

Finally, cultivating an industry whereby AMs is a requirement is our best hope to close the security gaps that are so obvious if only you know what to look for.

Written by Maxie Reynolds

#socialengineering #informationsecurity #attackermindset #defense #offense #offensivesecurity #businesssecurity #ams #criticalthinking #redteam #blueteam



Zlata P.

OSINT Analyst | OSINT Investigator | SOCMINT | Information Security Professional

3 年

Pre-ordering your book ??

Mitchell Tolbert

May we never confuse honest dissent with disloyal subversion. -Eisenhower

4 年

Amazing article! Thank you!

Rino Belcamino

Special Operations and Training: SAS-MC, CSOS, ATS-C, ASHER-S, Master Use of Force Instructor

4 年

This is great article Maxie. Been pushing this idea for many years. Also, trying to adopt “Red Cells” to test vulnerabilities should be used even if the tactics are unpleasant or strident.

要查看或添加评论,请登录

Maxie Reynolds的更多文章

  • Africa

    Africa

    Mind the Gap In 2023, more than 90 percent of people in high-income countries were online, compared to 26 percent in…

    1 条评论
  • Come In, Take a Load Off

    Come In, Take a Load Off

    By now most are familiar with Moore's Law, proposed by Intel Corporation co-founder Gordon Moore in 1965: It states…

    14 条评论
  • Starting a Company?

    Starting a Company?

    17 Things to Know Your job is problem-solving. You have to be really smart, really determined, or really lucky to be…

    15 条评论
  • In Focus: Subsea Network Architecture: IXPs

    In Focus: Subsea Network Architecture: IXPs

    Subsea data centers can provide low latency, efficient solutions. They can also reduce CO2 emissions and power…

  • In Focus: The Ocean – A Smart Use Case

    In Focus: The Ocean – A Smart Use Case

    About Subsea Cloud: Wet Data Centers Subsea Cloud places data centers subsea and in doing so eliminates the…

    3 条评论
  • Artificial Intelligence & the Telecoms Industry

    Artificial Intelligence & the Telecoms Industry

    About Subsea Cloud: Wet Data Centers Subsea Cloud places data centers subsea and in doing so eliminates the…

    10 条评论
  • Attracting and Retaining Young Talent: Actual Solutions

    Attracting and Retaining Young Talent: Actual Solutions

    Last month I published a post on some of the issues the telecoms industry faces in attracting and retaining young…

    5 条评论
  • The Future of the Telecoms Workforce

    The Future of the Telecoms Workforce

    I became involved with the PTC after attending the conference for Subsea Cloud last January. I was placed on the…

    23 条评论
  • In Focus: Gaming Companies

    In Focus: Gaming Companies

    About Subsea Cloud: Wet Data Centers Subsea Cloud places data centers subsea and in doing so eliminates the…

    1 条评论
  • A Bad Job at Describing a Good Thing

    A Bad Job at Describing a Good Thing

    "What does Subsea Cloud actually do?" This question comes up more than expected. Read about what we really do below…

    2 条评论

社区洞察

其他会员也浏览了