How Hackers Use Good Tools for Evil
ITProTV Edutainer Daniel Lowrie explained that cybercriminals don’t need to install malware to gain access to your network. There are a number of ways they can live off the land and use the same tools you are, as well as your employees, to get in and conduct advanced persistent threats (APTs). “It's not malware, yet it's doing something that it shouldn't,” he said. “Hackers think, ‘I didn't have to install anything. I'm using what's there. Thank you for the lovely gift.’” He added that IT administrators and cybersecurity pros need to be especially vigilant in watching for these types of breeches. “A lot of the tools that are available could be used for privilege escalation, persistence and things of that nature, and they're just sitting right there for hackers to use on Linux systems. Administrators need them to do their jobs, but in the hands of the wrong person, they can be used against us,” Lowrie said. “It's up to us to say, ‘Something seems amiss,’...