Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/26/2017
10:00 AM
John Bambenek
John Bambenek
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

Elections, Deceptions & Political Breaches

Political hacks have many lessons for the business world.

Political cyberattacks have taken many different forms over recent months, starting from the Democratic National Committee (DNC) hack, which appears to have been the work of Russian nation-state hackers to cause disruption and controversy around the US elections, to the potential information gathering of known Chinese hackers ahead of negotiations between President Donald Trump and Chinese president Xi Jinping, to the document leaks against French President Emmanuel Macron, allegedly by an American hacker.

In our unpredictable environment, where popular opinion and political debate are constantly changing, it's no wonder that cybercrime is becoming a powerful weapon in obtaining confidential information and as propaganda.

With a deluge of big cyberattacks like WannaCry hitting the headlines, it's easy to assume that cyberthreat actors are only interested in high-value, high-profile targets. This is isn't the full picture. It's often the countless smaller, third-party service organizations and suppliers — the ones that big government agencies and companies rely on — that become ripe, easily compromised targets. And this is the reason the tactics used are often relatively basic.

Tactics of Adversarial Actors
Security is compromised most often by simple deception techniques, not by technical skill. A hacker needs only a foothold on the corporate network. Successful social engineering through spearphishing attempts typically rely on three key attributes of simple deception: a plausible method (for example, a seemingly plausible email communication designed to blend into our inbox), a plausible narrative (such as an overdue invoice), and, finally, moderation, to make the material believable. If one element doesn't make the grade and the recipient is security savvy, those behind the spearphishing attack are less likely to succeed.

The first defense against threat actors is simple in nature but difficult to execute: teach your staff how to spot poorly executed deception attempts.

Cyber defense doesn't stop with preventative techniques. Detection capabilities are just as important. In a world where perimeter defense is no longer viable, businesses must assume that hackers have already breached their network and invest in finding and expelling them. Technology can detect data exfiltration and alert the organization as it happens with the details needed to stop the next potential moves of a hacker.

The End Goal and Takeaways for Enterprises
Attacks against enterprises are like political attacks in many ways. While some are carried out in hope of a ransom payday, other attacks are meant to glean insight into confidential corporate information that can be used in negotiations. In other cases, attackers might just want to cause a stir or expose poor security practices.

Although it is important to monitor both the techniques used by hackers and their motivations to predict what might be hit next and where to apply extra security measures, the fact is that often the solution is much simpler. Because most attacks begin with a case of simple deception, the focus should be on a combination of basic security education and technology — and making sure the information hackers could access is so limited that the damage is mitigated. This is what the political attacks of recent months can teach us in the business world.

This essay was adapted from a presentation John Bambenek will be giving at Infosecurity Europe, June 6-8.

Related Content:

John Bambenek is a Senior Threat Researcher at Fidelis Cybersecurity. His areas of specialty include digital forensics, global cybercrime investigation, and threat intelligence. He has developed open source feeds of threat intelligence data and works with law enforcement ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25789
PUBLISHED: 2020-09-19
An issue was discovered in Tiny Tiny RSS (aka tt-rss) before 2020-09-16. The cached_url feature mishandles JavaScript inside an SVG document.
CVE-2020-25790
PUBLISHED: 2020-09-19
** DISPUTED ** Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our secu...
CVE-2020-25791
PUBLISHED: 2020-09-19
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with unit().
CVE-2020-25792
PUBLISHED: 2020-09-19
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with pair().
CVE-2020-25793
PUBLISHED: 2020-09-19
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with From<InlineArray<A, T>>.