Attacks/Breaches

5/26/2017
10:00 AM
John Bambenek
John Bambenek
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

Elections, Deceptions & Political Breaches

Political hacks have many lessons for the business world.

Political cyberattacks have taken many different forms over recent months, starting from the Democratic National Committee (DNC) hack, which appears to have been the work of Russian nation-state hackers to cause disruption and controversy around the US elections, to the potential information gathering of known Chinese hackers ahead of negotiations between President Donald Trump and Chinese president Xi Jinping, to the document leaks against French President Emmanuel Macron, allegedly by an American hacker.

In our unpredictable environment, where popular opinion and political debate are constantly changing, it's no wonder that cybercrime is becoming a powerful weapon in obtaining confidential information and as propaganda.

With a deluge of big cyberattacks like WannaCry hitting the headlines, it's easy to assume that cyberthreat actors are only interested in high-value, high-profile targets. This is isn't the full picture. It's often the countless smaller, third-party service organizations and suppliers — the ones that big government agencies and companies rely on — that become ripe, easily compromised targets. And this is the reason the tactics used are often relatively basic.

Tactics of Adversarial Actors
Security is compromised most often by simple deception techniques, not by technical skill. A hacker needs only a foothold on the corporate network. Successful social engineering through spearphishing attempts typically rely on three key attributes of simple deception: a plausible method (for example, a seemingly plausible email communication designed to blend into our inbox), a plausible narrative (such as an overdue invoice), and, finally, moderation, to make the material believable. If one element doesn't make the grade and the recipient is security savvy, those behind the spearphishing attack are less likely to succeed.

The first defense against threat actors is simple in nature but difficult to execute: teach your staff how to spot poorly executed deception attempts.

Cyber defense doesn't stop with preventative techniques. Detection capabilities are just as important. In a world where perimeter defense is no longer viable, businesses must assume that hackers have already breached their network and invest in finding and expelling them. Technology can detect data exfiltration and alert the organization as it happens with the details needed to stop the next potential moves of a hacker.

The End Goal and Takeaways for Enterprises
Attacks against enterprises are like political attacks in many ways. While some are carried out in hope of a ransom payday, other attacks are meant to glean insight into confidential corporate information that can be used in negotiations. In other cases, attackers might just want to cause a stir or expose poor security practices.

Although it is important to monitor both the techniques used by hackers and their motivations to predict what might be hit next and where to apply extra security measures, the fact is that often the solution is much simpler. Because most attacks begin with a case of simple deception, the focus should be on a combination of basic security education and technology — and making sure the information hackers could access is so limited that the damage is mitigated. This is what the political attacks of recent months can teach us in the business world.

This essay was adapted from a presentation John Bambenek will be giving at Infosecurity Europe, June 6-8.

Related Content:

John Bambenek is a Senior Threat Researcher at Fidelis Cybersecurity. His areas of specialty include digital forensics, global cybercrime investigation, and threat intelligence. He has developed open source feeds of threat intelligence data and works with law enforcement ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7268
PUBLISHED: 2018-05-21
MagniComp SysInfo before 10-H81, as shipped with BMC BladeLogic Automation and other products, contains an information exposure vulnerability in which a local unprivileged user is able to read any root (uid 0) owned file on the system, regardless of the file permissions. Confidential information suc...
CVE-2018-11092
PUBLISHED: 2018-05-21
An issue was discovered in the Admin Notes plugin 1.1 for MyBB. CSRF allows an attacker to remotely delete all admin notes via an admin/index.php?empty=table (aka Clear Table) action.
CVE-2018-11096
PUBLISHED: 2018-05-21
Horse Market Sell & Rent Portal Script 1.5.7 has a CSRF vulnerability through which an attacker can change all of the target's account information remotely.
CVE-2018-11320
PUBLISHED: 2018-05-21
In Octopus Deploy 2018.4.4 through 2018.5.1, Octopus variables that are sourced from the target do not have sensitive values obfuscated in the deployment logs.
CVE-2018-8142
PUBLISHED: 2018-05-21
A security feature bypass exists when Windows incorrectly validates kernel driver signatures, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1035.