Basics 101 Flashcards
Who are the threat actors? (7)
- Insider Threats (employees, vendors, and other generally trusted individuals)
- Hackers
- Cyber-criminals
- Foreign governments and intelligent agencies
- Terrorists
- Organized crimes
- Hacktivism Groups (e.g., Anonymous)
What are the Threat Actors after?
Threat actors want your data and secrets, and/or to blackmail/extort money from you. This data includes:
- Usernames and passwords
- Sensitive company documents
- Protected Health document
- Credit card and banking/ financial information
- Export controlled technologies
- Intellectual properties and sensitive technological documents
- Personal identifying information
- Contact lists
- Confidential emails
According to the Ponemon Institute study: (3 stats)
- 37% of data breaches globally were Structured Threats (malicious or criminal attacks)
- 35% were caused by “human factor” (e.g., negligent employee or contractor)
- 29% caused by glitches that include both IT and business process failures
There are many methods that threat actors use to gain unauthorized access to systems. These methods include: (8)
- Malware/Viruses
- Social Engineering (talking, convincing or tricking someone trusted to give a threat actor access to a system over the phone, via email, in person, or through other means)
- Phishing or Spear Phishing (sending emails that look legitimate but have malicious links or attachments)
- Unpatched, outdated or vulnerable systems and software
- Baiting (removable media like USB drives)
- Use of weak or default passwords
- Cross Site Scripting attacks
- Stolen logon credentials
Leaders in system compromises from outside sources is ________.
Social engineering
How do most data breaches start?
Getting a user to click on a Phishing email or give out credentials over the phone or email is how most data breaches start
Reconnaissance
- Threat actors research (sometimes in great depth) individuals and companies with whom they are planning to target.
- They utilize a multitude of techniques, including gathering data from social media and other publicly available sources (known as Open Source Intelligence or OSINT), interviewing ex/disgruntled employees and other clandestine methods
Intrusion/Delivery
Threat actors gain access to the network via vulnerable systems, social engineering, phishing, baiting, malware, watering hole or other techniques to gain access to systems at the targeted location
Exploitation/Obtaining Credentials:
Once inside a network, threat actors will try and obtain user credentials, focusing on the “domain administrator” or “root” level access.
Pivoting/Lateral Movement
Once inside, threat actors may try to move laterally within the network to install as many “back doors” as possible for future and continued exploitation.
Installation
Threat actors may install a multitude of malignant utilities to conduct system administration duties, steal passwords, take screenshots, steal email and infect/control other systems
Data Exfiltration/Manipulation
- Threat actors will obtain emails, documents, databases, files, etc. from victims servers and workstations, and encrypt and send that data to other malicious servers on the Internet.
- In addition, some attackers can encrypt and destroy your data, holding it “hostage” until a ransom is paid to de-crypt it and make it useable again.
Maintaining Persistence:
Once threat actors gain access to a network (which sometimes takes a very long time and a considerable amount of effort) they go through extreme lengths to maintain that access by installing additional or updated tools, unknown malware programs, adding additional unknown system accounts, etc. This is also known as Advanced Persistent Threats (APT).
Boards and management need to consider:
- The organizational structure and reporting arrangements for cyber security operations
- The experience and expertise of the chief information security officer (CISO), and the need to balance industry knowledge against “street smarts” as they pertain to cyber issues
- Safeguarding data in a networked environment, which may encompass cloud data storage and the provision of services via the cloud.
- Creating a culture that is both security-conscious and aware of financial and reputational consequences of data breaches
PLA Unit 61398
- PLA Unit 61398 as one of the world’s most prodigious cyber hackers
- The Shanghai hackers had been responsible for at least 141 successful cyber intrusions in 20 major industrial sectors