Attackers have problems too: Attacks against Internet of Things (IoT) devices are simple (as in log in…), but the attacker never knows what kind of architecture they may hit.
5 Iowa State Uni servers breached, made to mine #Bitcoins via #Synology, 30k SSNs probably not stolen, #cyclones
5 Iowa State Uni servers breached, made to mine #Bitcoins via #Synology, 30k SSNs probably not stolen, #cyclones — 2 retweets 1 favorites
“Most attack code getting into organizations starts at the end point, where attackers escalate privileges and move to servers, then help themselves to the crown jewels. They then move onto compromise other servers to store their ill-gotten gains and to quietly exfiltrate sensitive data
“In 2010, police investigating what appeared to be a relatively minor case of financial fraud made a startling discovery: The case they were working on which involved $30,000 stolen from a local college was linked to a worldwide crime ring that was using malware to harvest personal data from infected computers and then sending it across the globe. The larger implications of the case came to light after forensic images from college servers were examined by the Center for Internet Security (CIS), a New York-based nonprofit that acts as a hub for sharing cyberthreat information and security best practices among state, local and tribal governments. CIS analysts discovered that the servers were infected by a nasty piece of computer code called Qakbot, which opens a back door into compromised computers, allowing cybercrooks to steal confidential information….”
“SANS is happy to bring you the latest in our complimentary series of Webcasts. Join us on Friday, August 10, 2012 at 1:00 PM as SANS presents: “Despite the obvious risk to the company's data and the cost of data breaches, system administrators either prefer to or are forced to keep their servers unpatched.”SANS strongly takes issue with the statement above by TrendMicro's Bernadette Irinco