How Hackers Use Good Tools for Evil

ITProTV Edutainer Daniel Lowrie explained that cybercriminals don’t need to install malware to gain access to your network. There are a number of ways they can live off the land and use the same tools you are, as well as your employees, to get in and conduct advanced persistent threats (APTs).

“It's not malware, yet it's doing something that it shouldn't,” he said. “Hackers think, ‘I didn't have to install anything. I'm using what's there. Thank you for the lovely gift.’”

He added that IT administrators and cybersecurity pros need to be especially vigilant in watching for these types of breeches.

“A lot of the tools that are available could be used for privilege escalation, persistence and things of that nature, and they're just sitting right there for hackers to use on Linux systems. Administrators need them to do their jobs, but in the hands of the wrong person, they can be used against us,” Lowrie said. “It's up to us to say, ‘Something seems amiss,’ and go in there.”

If you didn’t catch the live virtual event – or you want to watch it again – tune in September 18 and 19 for the rebroadcast of ChannelCon Online. Catch these sessions as well as The Role of Cloud Computing in Digital Transformation by DuWayne Harrison, keynotes from Shaquille O’Neal and Eric O’Neill, and many more. Earn up to seven CEUs from the comfort of your computer.
More Info: entry level it certifications

Comments

Popular posts from this blog

DDoS Attack Mean for My Security?

The Importance of Post-Attack Analysis

Profiling Hackers in the MITRE ATT&CK Navigator