[Infowarrior] - My Comments on the breach at [$COMPANY_NAME$]

Richard Forno rforno at infowarrior.org
Mon Sep 25 15:20:24 CDT 2017


Wish I'd thought of this....
 --rick

http://www.ranum.com/security/computer_security/editorials/generator/index.html

My Comments on the breach at [$COMPANY_NAME$]

I heard about the breach at [$COMPANY_NAME$] and the 
[$BREACH_QUANTITY$] [$DATA_TYPE$ one of "credit card", "patient 
record", "social security number", "user login", "hashed passwords",
"national security secrets", "Hollywood star's 'selfies'"] 
compromised. Of course this is a serious matter and is the largest 
since [$YESTERDAY_DATE$]

The people at [$COMPANY_NAME$] have not yet released details, which is 
appropriate given an incident response of this magnitude. I understand 
that they have the [$RESPONDER_NAME$ multiple of "FBI", "NSA", "CIA", 
"Mandiant", "army of consultants", "Keystone Kops"] involved and have 
issued a press release.

My guess is that the attackers were able to initially breach the target 
using a [$ATTACK_TYPE$ one of "phishing attack", "brilliantly clever 
targeted phishing attack", "piece of custom malware", "cat with a WiFi 
interface implanted in its head", "SQL injection attack", "basic 
website vulnerability", "army of ninjas", "variant of Stuxnet"] which 
is [$UNEXPECTED$ one of "totally unexpected", "the way it usually 
happens", "innovative", "obscure as hell", "bloody typical"] form of 
attack that is often used by [$USUAL_SUSPECTS$ multiple of "China", 
"North Korea", "CIA", "NSA", "Anonymous", "brotherhood of blades", 
"Bavarian Illuminati", "Trilateral commission", "hackers who have read 
'Hacking Exposed'", "any complete newbie"]   Until I know more about
it, I can't really guess about the details.

However, this illustrates the basic issues in information security, 
which is that organizations don't appear to have effective responses to 
basic malware and/or phishing attacks, and have aggregated critical 
data into central locations on their networks where it is accessible. 
Once an attacker gets inside, it is pretty easy for them to escalate 
privileges, find out where the data is, and exfiltrate it. 
Organizations with critical data should segregate it off their network, 
perform regular vulnerability audits and remediation, maintain detailed 
system logs, and use two factor authentication for administrator 
access. If it's a large organization, Big Data also helps, but I am
not sure how.



More information about the Infowarrior mailing list