Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
38
vice-president, who may have had access to more permissions than what might be considered
best practice for a VP of Finance.
This attack likely could have been prevented by applying the
principle of least privilege
, which we’ll
explore in a later section. Since the attack was enabled by a fake account, it also could have been
prevented by rigorously auditing accounts. Lastly, since this activity was performed after the VPs
termination, better monitoring of anomalous activity may have also
prevented or mitigated the
attack.
Nation States
: Although international cyber politics,
cyber war, and digital intelligence are vast
subjects and significantly beyond the scope of this Module, we should recognize that some of the
most proficient, resourceful, and well-financed operators of cyber attacks exist at the nation-state
level within many different countries across the globe.
Since 2009, North Korean threat actors, usually grouped under the name
Lazarus
,
41
have engaged
in a number of different attacks ranging from data theft (Sony, 2014), to ransomware (WannaCry,
2017) to financial theft targeting banks (Bangladesh Bank, 2016) and cryptocurrencies - notably,
the 2022 Axie Infinity attack. These attacks have resulted in the loss and leak of corporate data,
including proprietary data (Sony) and financial losses for companies that paid a ransom.
An information assurance firm called
Yüklə
Dostları ilə paylaş: