Hacking Defense Vectors

Here’s independent local confirmation on a cybersec topic I’d been overlooking in the mass media. My biggest concerns in the network defense business were always external actors looking for big things in high-level enterprises. Everybody I worked with had a security clearance, so it was normally assumed nobody was looking to abuse the computer tools. With crypto disappearing at alarming rates and international skullduggery proceeding apace, it’s refreshing to remember people have bills to pay and the cyber n’er-do-wells are no different.

Sale of Stolen Credentials and Initial Access Dominate Dark Web Markets.

“The information stolen included the names and Social Security numbers of current and former participants in the DPS employee health plan, employee fingerprints, bank account numbers or pay card numbers, driver’s license numbers, passport numbers and health plan enrollment information.”

Then they pull this shyt.

Just hope someone doesn’t really want to break things and hurt people. You can play with annoying DOS and sinkholing crap all you want, but the best preemptive strikes are a 1-keystroke [enter] pull-of-the-pin, scripting the desired outcome. You have to already be in for that to work – longer the recon, the better. Staying on top of that good account/password management is your first line of defense, but USB sticks can walk right by. These days they can do it at the speed of light remotely from a cellphone, if you’re not careful.

Leave a Reply

Your email address will not be published. Required fields are marked *