Posts Tagged ‘cyber weapons’

The OPM Breach Is Not Unique; Standard TTPs Can Get You the Crown Jewels: Wednesday’s report about the 2014 and 2015 Office of Personnel Management (OPM) breaches showed us that unsophisticated attackers can gain access to sensitive information. The highly detailed report by the House Committee on Oversight and Government Reform lists the known evidence of how two groups conducted their CNE (computer network exploitation) operations inside the OPM network. While the…
When Networking and Security Gear Is Used for Surveillance: It’s not easy to stop attacks when your best defenses are used against you. This is a hard lesson that many organizations learned on August 13th, when a shifty group calling themselves the “Shadow Brokers” released exploit tools targeting firewalls from Cisco, Juniper, and Fortinet. Now the security system you trust to protect the “front…
2016 Cyber Weapons Report: Looking for Attackers in All the Wrong Places: What tools do attackers use? The 2016 Cyber Weapons Report seeks to address this question by analyzing real-world attacks and other anomalous activity in organizations’ networks. This report focuses on the actions that occur after an initial intrusion, including command and control, reconnaissance, lateral movement, and data exfiltration. The Cyber Weapons Report reveals that organizations…