HomeCII/OTTourists and Network Intruders Reveal Themselves by Gazing Upwards – Krebs on...

Tourists and Network Intruders Reveal Themselves by Gazing Upwards – Krebs on Security

Published on

spot_img

In large cities, tourists are often seen gazing upward at the towering skyscrapers, a behavior that distinguishes them from the locals. Interestingly, this same behavior can be observed in cybercriminals who carry out devastating attacks such as data theft and ransomware. Security experts are calling for more organizations to set up virtual tripwires that can detect when authorized users and devices exhibit this tourist-like behavior.

Cisco Talos, a prominent cybersecurity firm, recently published a blog post warning about the increasing rate of high-sophistication attacks on network infrastructure. The company has observed a concerning trend of cybercriminals taking the initial steps to understand and control a network environment. These steps include performing basic commands to gather information about the network, such as its configuration, interface, routes, and neighbors. By doing so, attackers gain a foothold and a better understanding of the network.

Cisco’s alert focused on state-sponsored cyber espionage attacks from China and Russia that exploit vulnerabilities in aging network routers. However, the method of initial intrusion is not the primary concern for organizations. Rather, the main issue is how quickly they can detect and detach these attackers from their network. Whether it is through zero-day vulnerabilities or compromised credentials, organizations need to be vigilant in identifying and responding to cybercriminals’ first steps.

This tourist-like behavior is also commonly observed in ransomware and data ransom attacks. Attackers often purchase access to a target’s network from dark web brokers, who sell stolen credentials and compromised computers. When these resources are first used by the attackers, they typically run basic commands to determine their location and identity within the victim’s network. Recognizing this pattern can help organizations nip these attacks in the bud.

Thinkst, a security company, has developed a unique approach to address this issue. They offer tripwires called “canary tokens” that can be embedded in regular files and act as alerts when suspicious activity is detected. These tokens can be customized and implanted in various parts of a network or web application to lure attackers. When the token is accessed or triggered, an alert is sent to the organization, notifying them of the potential breach.

Canary tokens are designed to be useless to attackers, serving only as decoys. For example, an AWS canary token may resemble the digital keys to a cloud environment, but it offers no actual access. Instead, it acts as a bait to attract attackers, and organizations receive an alert when the token is touched. Thinkst provides these canary tokens for free, offering organizations a simple and effective method to detect and deter cybercriminals.

Deception and honeypot services have long been used in the cybersecurity industry to confuse and disrupt attackers. However, Thinkst believes that many organizations do not have the time or resources to engage in counterintelligence activities. Instead, they advocate for the use of canary tokens, which can be quickly deployed to lay traps in sensitive areas of a network or application.

Canary tokens can not only trip up cybercriminals but also “red teams,” security experts hired to identify vulnerabilities in a company’s systems. These tokens have made even experienced penetration testers hesitant to use credentials gained during engagements. By increasing the time it takes for attackers to navigate a network, canary tokens are proving to be an effective tool in the fight against cybercrime.

Thinkst makes money by selling Canary Tools, a paid version of their product that includes a small hardware device. This device serves as a canary token server and can be installed on the local network. With a sophisticated defense team, organizations can strategically place these devices in key locations, ensuring optimal coverage.

Ultimately, the idea behind canary tokens is simplicity and cost-effectiveness. They provide a significant return on investment and can be easily deployed while larger security improvement projects are underway. By employing these virtual tripwires, organizations can detect and respond to cyber intrusions more rapidly, preventing potential data theft and ransomware attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...