The Blog
6 Emerging Cyber-Threats

6 Emerging Cyber-Threats

8th Mar 2017

CIO

6 Emerging Cyber-Threats You Didn’t See in the News

 

As an industry, the constant stream of cyber-attacks in the news can be overwhelming. It seems like every day we see front-page headlines announcing defaced websites or massive data breaches.

But what about the attacks that never make the news?

Here at Darktrace, our worldwide deployments find early-stage threats every day. While these developing threats never make the headlines, they often emerge in fascinating and unexpected ways.

 

Here’s a selection of what we’ve found for our customers:

  1. An attacker hacked into a biometric fingerprint scanner, used for physical access at a major manufacturing company.

This company used network-connected fingerprint scanners, allowing the attacker to use Telnet connections and default credentials to gain access. There were strong indicators that the attacker was able to breach other servers from.

  1. A cyber-criminal gained access to a video conferencing system of a multi-national corporation.

Using a backdoor Trojan Horse, the attacker used six external computers to collect data from the camera, presumably in an attempt to steal video from confidential meetings.

  1. A new strain of malware forced the computers of a security company to visit explicit websites.

Using random, algorithmically-generate websites, the attackers tried to plant incriminating evidence on the network by generating illegal web activity.

  1. A threat-actor hacked a ‘Lost and Found’ computer at a major European airport.

To gain entry, the attacker used DNS servers — an essential capability for internet communication, though rarely used for information transfer.

  1. A hacker tried to compromise an industrial power network using default codes.

After penetrating the SCADA energy network, the attacker tried to establish a remote control link by using access codes listed as factory defaults online.

  1.     A phishing email launched a ransomware attack on a non-profit charity.

Using a fake email, the attacker claimed to have an invoice from a legitimate supplier. The attached pdf contacted a server in Ukraine and downloaded malware attempting to encrypt the non-profit’s network.

 

Our ‘immune system’ technology caught each attack at an extremely early stage, giving us a rare look at how modern threats are able to bypass legacy systems. Traditional security solutions can only detect attacks with pre-determined signatures. But in each case, threat-actors used signature-less attacks to blend into the noise of the network.

By harnessing the power of unsupervised machine learning, the Enterprise Immune System learned ‘normal’ for each of these networks, and detected the threats as anomalous behaviour. Our threat analysts then determined the nature of the attack and counselled the organization to take appropriate action.

If you’re interested in learning the full story behind these emerging cyber-threats, check out Darktrace’s full Global Threat Case Studies report.

 

Justin Fier, Director of Cyber Intelligence, Darktrace.

Share this:
Making Technology Easy and Enjoyable CIO 19
Nov
Making Technology Easy and Enjoyable

Making technology easy and enjoyable

CIO – A Salesman before the Board CIO 23
Nov
CIO – A Salesman before the Board

by Vince Sparks – IT Director Stobart Group

Request more information

You have missed out some details, please try again.

Your Name:
Job Title:
Company Name:
Email:
Phone:
Please answer the above question to prove that you are human.

©2017 Global Business Intelligence | All Rights Reserved

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we'll assume that you are happy to receive all cookies. You can find out how we use cookies here.