We are all aware of the need for securing our electronic, or cyber, environment. But not everyone is aware of how widespread the threat has become.
Threat actors are unscrupulous individuals in the cybersecurity landscape. They are always looking for a way to gain access into our networks.
Threat actors can come from a variety of sources: they can simply be computer-literate individuals who love the challenge; they may be disgruntled employees who are annoyed at being separated from their company; they might be protestors who are angry about a corporate stance on a topic; they might be criminals who are intent on stealing data and selling it to make money; or the threat might come from a foreign state, through an organized program.
Your organization likely possesses or generates valuable data. Data is always of some value – whether it is customer contact information lists, specifics about manufacturing a product, know-how for a particular concept, corporate strategy, or anything else that can be gathered and sold to, or used by, others.
You may have limited cybersecurity protection, or you may have invested in a state-of-the-art system. Regardless of what you have or how well protected your data is, it isn’t going to stop the bad actors trying to get at it.
Who the threat actors are, determines what they might want. Their desired outcome can run the entire spectrum: they may want the excitement of trying to “break in” to your system – just to see if they can do it; they may be mad at the company and want to cause disruption to get revenge; or perhaps they are on a crusade and want to be an inconvenience your company in order to gain attention; they may simply want to sell your data for money; or they could have a more nefarious purpose.
For the most part, the standard high-level process of the way threat actors act may seem to be somewhat similar: they hunt to see where you are weak, they get in, they do their damage, and leave with their desired outcome.
You’ve seen ants. The insect. They are opportunists. They send their scouts off, alone or in twos, to hunt for tasty morsels of food. Once they find something that fits the bill, they report back and, before you know it, your kitchen is inundated with a thousand of the little critters! You will notice, however, that they all follow the scent trail left by the original scout.
So, too, do threat actors. The trail they follow isn’t scent, it is of weaknesses in your security posture. They follow the trail to access your environment, sometimes, without you even knowing they are there. They sneak in through the little hole in your baseboard and gobble up their desired tasty morsel before disappearing off again.
The trick to cyber security is in figuring out where the holes under your baseboards are located, and in watching carefully for any signs of little ant feet coming out from under them. You may have systems in place to alert you to the fact that the threat actors (ants) are on their way or already there. That’s great, but your job is to prevent them from getting their desired outcome - the “tasty morsel”.how they interrelate with any compliance requirements that must be met by the company.
To put it very succinctly, they generally follow a 4-step procedure*:
[1] Reconnaissance: this is the process of scanning your system to see where the weak areas are located. Weaknesses might be found in the software, the hardware, the physical environment, or even in the people.
[2] Infiltration: this is where the actual methods – the “techniques” – can be significantly different. According to IBM[1] “Attackers have a historical inclination to choose the path of least resistance in pursuit of their objectives.” This means that they will take advantage of any slip-up you make in your cybersecurity efforts. It only takes one instance of not implementing a security measure, due to either action or inaction, and they’ll be inside your environment doing things you may not be able to detect... until it is too late.
According to the MITRE ATT&CK[2] database, there are about 50 documented techniques, along with even more sub-techniques, of how they can gain access. The list includes things like phishing, drive-by compromise, brute force, man-in-the-middle, to name just a few.
[3] Activities: once they are inside your environment, what actions they take in can significantly differ, depending on their desired outcomes. They may move laterally to gain additional access privileges. They may place software that can be triggered at a later time. They may initiate a backdoor, so they can access your system whenever they want. The list of what they can do is pretty long.
In fact, the MITRE ATT&CK[2] database informs us that there are over 100 main documented activities, with an additional list of sub-techniques in which they can engage while they have access to your system.
[4] Then we arrive at their desired outcome. While they are in your environment, they could lock or encrypt your entire computer system until a ransom is paid. They might grab and download data to sell. In fact, there are over 40 categories of additional activities that MITRE ATT&CK[2] tells us that the bad actors can perform, ranging from account access removal, to firmware corruption, to system shut down, to data destruction.
Quite frankly, it is amazing that threat actors have been so busy in finding ways to access and manipulate our environments for negative purposes. Imagine how awesome things would be if they were working for us, on our side?!
*What threat actors actually do can be much more complex than the four steps noted above - but this is simplified for illustration purposes.
This is a very positive question. A whole industry has evolved around stopping the threat actors from accessing environments that belong to other people: from hardware; to specialist software; to training humans and machines (including AI); to be aware of the environment and to detect when activities seem suspicious or deviate from the norm. There is a lot that can be done.
IBM[1] further noted, “84% of attacks could have been stopped with best practices and security fundamentals, such as asset and patch management, credential hardening, and the principle of least privilege.”
OWASP is an organization that aims to improve security and help protect applications from cyberattacks. From OWASP’s most recent report, one of the top 5 causes of incursion was security misconfiguration. When a security practitioner is under time pressure, perhaps while wearing multiple hats, mistakes are easily made. Unfortunately, bad actors are likely to be sitting behind the baseboards, watching, and waiting to capitalize on those mistakes so they can get their desired morsel.
However, don't be too dismayed - the situation isn’t as grim as it seems. With preparation and thought you can help to fortify your environment against encroachment if you follow the basic principles of cyber security.
With the use of Generative AI to help develop scripts, which aid in speeding up the detection and response process, your time can be better spent in actively investigating suspicious activity.
If you aren’t confident in your knowledge, or need to brush up what you once knew... take a class. It will certainly help you feel better about the relevance of what you know and might give you some new ideas that you hadn’t thought of!
===
Sources:
[1] IBM XForce Threat Intelligence Index 2024
[2] MITRE ATT&CK https://attack.mitre.org/
[3] OWASP https://owasp.org/Top10/
===
We provide either standard industry training classes or can customize a program to suit your specific needs and budget. Our trainings are always delivered by certified, expert instructors, virtually/online in real time.
You can view our Security Training portfolio here:
https://www.nc-expert.com/training-classes-by-track#NetworkSecurity
You are welcome to enroll individual employees into our public classes. We can accommodate private groups virtually or in person at your site. Contact us for details.
You are welcome to visit our website homepage:
https://www.nc-expert.com/
===
NC-Expert is a privately-held California corporation and is well established within the professional IT industry certification training, courseware development, and consulting markets.
NC-Expert has won numerous private contracts with Fortune level companies around the world. These customers depend on NC-Expert to train, advise, and mentor their staff.
If you are looking for the best in IT industry training then call us at
(855) 941-2121 or sales@nc-expert.com today.
Important Notice: NC-Expert does not accept enrollment applications from independent individuals. We require that employers pay for their employees. We continue to service corporate clients, using B2B transactions, with no change in service. We apologize for any inconvenience.
Our vision is to provide innovative, relevant, and accessible technical consulting and training for executives and engineers which will enable them to directly impact the growth of their companies.
+1 (855) 941-2121
5113 Johnson Dr
Pleasanton, CA 94588
sales@nc-expert.com
NC-Expert - All Rights Reserved