Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

04:10 PM
Sara Peters
Sara Peters
Quick Hits
Connect Directly

'Hand-To-Hand Digital Combat' With Threat Actors

CrowdStrike CEO and co-founder George Kurtz explains how to fight attackers, not fight malware.

"People don't have a malware problem. They've got an adversary problem," says George Kurtz, CEO and co-founder of CrowdStrike. Last week at the Cybersecurity Summit in New York, Kurtz presented a case study of how Hurricane Panda and other organized cybercrime groups are attacking systems without using malware -- which makes them far more difficult to detect -- and how to combat them.

In lieu of malware, says Kurtz, attackers are manipulating legitimate tools like PowerShell and conducting surreptitious intelligence gathering using one-line web shells like China Chopper. This helps them blend in with regular users -- the bigger the user base, the harder it is to detect them.

According to Kurtz, organizations need more visibility into what's happening across their computing environment. Instead of just looking for "indicators of compromise" -- like malware infections, command-and-control traffic, or data exfiltration -- they need to start looking for "indicators of attack."

For example, instead of just watching for malware, companies need to watch for any sort of executable that's out of the ordinary and then dynamically respond to whatever seems suspicious. Kurtz describes it as "hand-to-hand digital combat" with an adversary.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
9/23/2014 | 5:30:33 PM
Did You Catch That ?

"...Instead of just looking for "indicators of compromise" -- like malware infections, command-and-control traffic, or data exfiltration -- they need to start looking for "indicators of attack."


Indicators of attack ?   I thought I that is what I have been doing all this years -  What am I miss here ?

User Rank: Ninja
9/23/2014 | 5:29:26 PM
Who Needs Malware ?

It really is disturbing to think that regards of your best effortts your network can still be compromised with  ease for an experienced hacker. 

Now that hackers have graduated to no longer needing malware -  this task just became even more difficult.

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...