• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Student360
  • About
    • Secure360
    • UMSA
  • Secure360 2022
  • For Sponsors
  • For Speakers
  • Get Involved
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

How to think like an attacker

January 29, 2016 by Secure360 and UMSA

mindset of a cyber criminal

Copyright: Pixaby

You have probably heard people say, to defend yourself from attacks, you have to think like an attacker. Back when a large amount of embarrassing celebrity photos were leaked a couple years ago, Mark Cuban, Dallas Maverick’s owner, decided to try it for himself. He pretended to be an Internet criminal and attempted to access his own Apple iCloud account using a pen testing technique. He realized quite quickly that his seemingly sophisticated security could actually be easily hacked through a simple Google search. He was quick to Tweet his findings to his followers, but it might be advice that we all can learn from.

The mind of cybercriminals

To better defend yourself and your organization from cyber attackers, you need to put yourself in their mindset. Individuals who are willing to understand the behaviors and learn from attackers’ methods, will also be able to determine how their own actions will affect the outcome. Thinking like an attacker by reenacting real-life scenarios on a network will allow businesses to find holes before an attacker does, and to understand the vulnerabilities that must be taken care of immediately.

What does the mind of a cyber attacker look like?

Patient and persistent

Hackers are persistent when it comes to making their attack. They spend time getting to know the organizational structure and the network, and they actively investigate the best way to infiltrate an organization. Whether they are motivated by money or another cause, cyber attacks have evolved into much darker, more complex methods.

Similar attack patterns

While malware today has become much more sophisticated, it can exhibit specific behaviors based on user activity, and is sophisticated enough to wait quietly in the shadows, when necessary, to bypass security solutions. Despite the sophistication in these malware tools, we often find that many attackers follow the same basic patterns and methods of attacks. In the Verizon Data Breach Investigations report, it was reported that 92% of cyber attacks in the past 10 years were linked to just nine basic attack patterns. Of these, most companies had to face only between two and four.

Asset or object oriented

Every action performed by an attacker is usually a phased progression towards their goal or objective. Hackers adjust their methods based on the successes and failures, and they often reuse resources. The ability to look at the entire view of an attack and predict the steps the attacker will take will allow businesses to understand how future attacks will play out.

It’s time to change the way we think

PWC Global State of Information Security reported that we saw more security incidents in 2015 than the previous year, with 38% more security incidents detected and the theft of “hard” intellectual property increased 56%. While spending on security continues to increase, why do we still see increases in cyber breaches? Many believe this is a result of our reactive approach to cyber attacks—it is not until after a major threat is exposed within our own organization (or another large, public organization) that we take the steps to deploy security solutions. Security and IT professionals should prioritize their efforts towards understanding which of their security systems are working as expected and knowing what their cyber security risks are by thinking like an attacker.

Filed Under: Business Continuity Management, Cybersecurity, Risk and Compliance

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Comments

  1. Kelley Archer says

    January 29, 2016 at 10:33 am

    Attending Black hat or DEFCON in Las Vegas helps one understand and mingle with hackers. I highly recommend companies send an employee every year to one of these in order to understand the Dark side and help stay on top of the latest vulnerabilities hackers are working on.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: New post alert! Learn more about our awesome 2022 @UMSAOrg #scholarship winners https://t.co/C8VnqX3wWW
    about 9 hours ago

  2. Secure360 Conference
    Secure360 Conference: With so much fun had this year, we're eager for next year! Mark your calendars for May 9-10, 2023 back at Mystic La… https://t.co/Cbk0abnNSO
    about 1 day ago

  3. Secure360 Conference
    Secure360 Conference: With #Sec360 2022 officially in the books, we wanted to share a little recap of the fun! https://t.co/iMPwAp1Kac … https://t.co/kk7xRUXoRo
    about 4 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2022 Secure360. All rights reserved.